Internet Packet Switching and Its Impact on the Network Neutrality Debate and the Balance of Power Between IP Creators and Consumers Rob Frieden, Pioneers.

Slides:



Advertisements
Similar presentations
Delivery and Forwarding of
Advertisements

Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) User Datagram Protocol.
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Human Rights in the Digital Era Conference Net Neutrality Policy in the UK & the Citizen’s Interest in Neutral Networks Giles Moss Institute of Communications.
1 Computer Networks IP: The Internet Protocol. 2 IP is a connection-less, unreliable network layer protocol IP provides best effort services in the sense.
Page: 1 Director 1.0 TECHNION Department of Computer Science The Computer Communication Lab (236340) Summer 2002 Submitted by: David Schwartz Idan Zak.
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 3: September 11, 2003 Internet Basics, continued Acknowledgments: R. Wang and J.
IP Addressing: introduction
CSCI 4550/8556 Computer Networks Comer, Chapter 20: IP Datagrams and Datagram Forwarding.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
Internet 3.0: Assessing the Scope of a Non-Neutral and Tiered Web Internet 3.0: Assessing the Scope of a Non-Neutral and Tiered Web Rob Frieden, Pioneers.
Network neutrality is the idea that all internet traffic should be treated equally. It does not matter who is downloading and what is being downloaded.
What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Chapter 6: Packet Filtering
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Computer Networks Lecture 5 Packet Switching & Circuit Switching, Causes of impairment Lahore Leads University.
Dr. John P. Abraham Professor UTPA
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 19 Network Layer Protocols Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Overview of Network Neutrality Kyle D. Dixon Senior Fellow & Director, Federal Institute for Regulatory Law & Economics The Progress & Freedom Foundation.
Net Neutrality or Net Bias? Finding the Proper Balance in Network Governance A Presentation at the What Rules for IP-enabled NGNs Workshop International.
Chapter 20 Network Layer: Internet Protocol
Network Neutrality and Its Potential Impact on Carrier Pricing Network Neutrality and Its Potential Impact on Carrier Pricing Rob Frieden, Pioneers Chair.
Deep Packet Inspection Technology and Censorship Deep Packet Inspection Technology and Censorship Rob Frieden, Pioneers Chair and Professor of Telecommunications.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
End-to-End Principle Brad Karp UCL Computer Science CS 6007/GC15/GA07 25 th February, 2009.
IT 210: Web-based IT Fall 2012 Lecture: Network Basics, OSI, & Internet Architecture.
Address Resolution Protocol (ARP). Internet and Data Link Layer Addresses Each host and router on a subnet needs a data link layer address to specify.
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Lect1..ppt - 01/06/05 CDA 6505 Network Architecture and Client/Server Computing Lecture 3 TCP and IP by Zornitza Genova Prodanoff.
Chapter 3 TCP and IP 1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Internet.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
IP Fragmentation. Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on rcving side,
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
The Digital Advantage: How Nations Win and Lose the Silicon Sweepstakes The Digital Advantage: How Nations Win and Lose the Silicon Sweepstakes Rob Frieden,
Chapter 3 TCP and IP Chapter 3 TCP and IP.
Behrouz A. Forouzan TCP/IP Protocol Suite, 3rd Ed.
Packets & Routing Lower OSI layers (1-3) concerned with packets and the network Packets carry data independently through the network, and into other networks…
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Packet Sniffing.
Guide to TCP/IP Fourth Edition
Dr. John P. Abraham Professor UTPA
Chapter 20 Network Layer: Internet Protocol
Wide Area Networks and Internet CT1403
Dr. John P. Abraham Professor UTRGV, EDINBURG, TX
Delivery and Forwarding of
Dr. John P. Abraham Professor UTPA
Protocols 1 Key Revision Points.
Net 323 D: Networks Protocols
Protocols & Packet Switching
CS4470 Computer Networking Protocols
COMPUTER NETWORKS CS610 Lecture-29 Hammad Khalid Khan.
Data Communication and Computer Networks
NET 323D: Networks Protocols
32 bit destination IP address
Transport Layer 9/22/2019.
Presentation transcript:

Internet Packet Switching and Its Impact on the Network Neutrality Debate and the Balance of Power Between IP Creators and Consumers Rob Frieden, Pioneers Chair and Professor of Telecommunications Penn State University web site: blog site: A Presentation at the 2007 IP Scholars Conference DePaul University, School of Law Chicago, Illinois August 9-10, 2007

2 Main Points of the Paper Improvements in traffic management technology make it efficient and economical for Internet Service Providers (“ISPs”) to operate non-neutral networks offering “better than best efforts” traffic routing and variable quality of service. Improvements in traffic management technology make it efficient and economical for Internet Service Providers (“ISPs”) to operate non-neutral networks offering “better than best efforts” traffic routing and variable quality of service. ISPs oppose any limitation on their options for tiering and diversifying services that can accrue financial, operational and consumer benefits, but also achieve anticompetitive goals. ISPs oppose any limitation on their options for tiering and diversifying services that can accrue financial, operational and consumer benefits, but also achieve anticompetitive goals. Net neutrality advocates believe that the Internet has contributed to national productivity, economic opportunity and innovation in light of “best efforts,” end-to-end connectivity. Net neutrality advocates believe that the Internet has contributed to national productivity, economic opportunity and innovation in light of “best efforts,” end-to-end connectivity.

3 Main Points of the Paper Traffic management using “packet sniffing” also provides ISPs with the likely ability to respond to Digital Right Management instructions from content providers by blocking copyright infringing traffic rather than delivering it with copy protection intact. Traffic management using “packet sniffing” also provides ISPs with the likely ability to respond to Digital Right Management instructions from content providers by blocking copyright infringing traffic rather than delivering it with copy protection intact. The Network Neutrality debate should include consideration whether active traffic management eliminates the safe harbor exemption from secondary liability for copyright infringement provided by §512 of the Digital Millennium Copyright Act. The Network Neutrality debate should include consideration whether active traffic management eliminates the safe harbor exemption from secondary liability for copyright infringement provided by §512 of the Digital Millennium Copyright Act. When ISPs elect to operate non-neutral networks through cheap and effective traffic management technology, they challenge the presumption that ISPs can only operate as neutral conduits. When ISPs elect to operate non-neutral networks through cheap and effective traffic management technology, they challenge the presumption that ISPs can only operate as neutral conduits.

4 Packet Sniffing Explained ISPs use packet switching to subdivide traffic for routing over any available network. ISPs use packet switching to subdivide traffic for routing over any available network. Each packet contains a header that provides routers with needed information about the source and destination of traffic using addressing and management protocols such as TCP/IP. Payloads in packets contain content. Each packet contains a header that provides routers with needed information about the source and destination of traffic using addressing and management protocols such as TCP/IP. Payloads in packets contain content. Improvements in router technology make it possible for ISPs to secure more information from headers for purposes of tiering and prioritizing traffic based on the nature of the content, e.g., streaming content needing instantaneous (“real time”) delivery and high quality of service versus store and forward content such as not requiring immediate processing particularly during network congestion. Improvements in router technology make it possible for ISPs to secure more information from headers for purposes of tiering and prioritizing traffic based on the nature of the content, e.g., streaming content needing instantaneous (“real time”) delivery and high quality of service versus store and forward content such as not requiring immediate processing particularly during network congestion. Routers also can interrogate (“sniff”) headers for instructions on Digital Rights Management, possibly including a go/no go determination whether the intended recipient has the requisite “rights” to receive a specific stream of packets. Routers also can interrogate (“sniff”) headers for instructions on Digital Rights Management, possibly including a go/no go determination whether the intended recipient has the requisite “rights” to receive a specific stream of packets.

TCP Packet Header 4500XXXX XXXX XXXX 4b Ver4b H dL n ToSToS Length in Bytes IP ID 0D FM F M F 13- bit Fra g. Off set TTLTTL ProtocolHeader Checksum Source IP Address XXXX XX Destination IP Address So urc e Por t Destination PortSequence NumberAck Number XXXX XX source: Michael McDonnell and Winterstorm Solutions, Inc. available at:

6 An Easier Analogy

9 How Might ISPs Lose the §512 Safe Harbor Exemption? §512 of the DMCA balances ISPs’ obligations not to induce or contribute to copyright infringement with the national interest in promoting Internet commerce. §512 of the DMCA balances ISPs’ obligations not to induce or contribute to copyright infringement with the national interest in promoting Internet commerce. The DMCA establishes 4 safe harbor exemptions when “online service providers” operate as a neutral, transitory conduit for content, temporarily cache content, store content at the direction of a user and provide search tools for linking to content created by others. The DMCA establishes 4 safe harbor exemptions when “online service providers” operate as a neutral, transitory conduit for content, temporarily cache content, store content at the direction of a user and provide search tools for linking to content created by others. ISPs lose an exemption by not responding to requests to take down infringing content and arguably when they know about infringement and have the right and ability to control such conduct. ISPs lose an exemption by not responding to requests to take down infringing content and arguably when they know about infringement and have the right and ability to control such conduct.

10 Recalculating the Cost of Deep Packet Inspection ISPs characterize network neutrality as creating disincentives to invest in next generation infrastructure and the (re)imposition of “confiscatory” common carrier regulation. ISPs characterize network neutrality as creating disincentives to invest in next generation infrastructure and the (re)imposition of “confiscatory” common carrier regulation. Ironically ISPs have financially benefited from the presumption that they operate as neutral conduits. Ironically ISPs have financially benefited from the presumption that they operate as neutral conduits. When an ISP decides to use packet sniffing to differentiate service it cannot readily ignore the DRM instructions also contained in the header. When an ISP decides to use packet sniffing to differentiate service it cannot readily ignore the DRM instructions also contained in the header. Arguably ISPs can act on DRM flags using ISP routers as opposed to sending the traffic onward to its final destination where end user equipment might process the flag if lawfully required to do so (see ALA v. FCC, 406 F.3d 689 (D.C. Cir. 2005). Arguably ISPs can act on DRM flags using ISP routers as opposed to sending the traffic onward to its final destination where end user equipment might process the flag if lawfully required to do so (see ALA v. FCC, 406 F.3d 689 (D.C. Cir. 2005). The potential loss of the DMCA Sec. 512 safe harbor may change the cost/benefit analysis in non-neutral network operation. The potential loss of the DMCA Sec. 512 safe harbor may change the cost/benefit analysis in non-neutral network operation.

11 Conclusions ISPs do not have an affirmative duty to monitor their traffic streams to detect IP infringement. ISPs do not have an affirmative duty to monitor their traffic streams to detect IP infringement. However technological innovations in routers and packet inspection create opportunities for ISPs to generate more revenue by operating non-neutral networks. However technological innovations in routers and packet inspection create opportunities for ISPs to generate more revenue by operating non-neutral networks. When making the affirmative decision to use packet sniffing for service tiering, ISPs no longer remain passive conduits. When making the affirmative decision to use packet sniffing for service tiering, ISPs no longer remain passive conduits.

12 Conclusions (cont.) Having decided not operate as non-neutral conduits, ISPs cannot readily ignore DRM formatting standards that could insert header information about whether ISPs should continue to route traffic in light of possible piracy. Having decided not operate as non-neutral conduits, ISPs cannot readily ignore DRM formatting standards that could insert header information about whether ISPs should continue to route traffic in light of possible piracy. Deep packet inspection may provide some degree of contemporaneous DRM that ISPs may not ignore if they want to retain safe harbor exemption from secondary liability. Deep packet inspection may provide some degree of contemporaneous DRM that ISPs may not ignore if they want to retain safe harbor exemption from secondary liability. If ISPs comply with DRM instructions creating a go/no go decision regarding traffic routing, software and hardware will have preempted end users from accessing content on fair use grounds. If ISPs comply with DRM instructions creating a go/no go decision regarding traffic routing, software and hardware will have preempted end users from accessing content on fair use grounds.