scholarly journals The transformation of network neutrality in Canada

Author(s):  
Natalie Andrusko

"Telecommunications technology has dramatically transformed an individual's ability to access information. Internet surfers are often unaware of the ways in which their Internet services are being managed, and even fewer are familiar with the term Internet neutrality. As a growing trend, more Internet Service Providers (ISPs) in Canada are intervening with the infrastructure of the Internet by utilizing traffic management practices, such as bandwidth 'throttling'1, which hinder a user's ability to quickly access certain types of content online. Internet traffic management practices (ITMP) are a means for ISPs to control their 'congested'2 networks, with the aim of optimizing or improving their network's performance, or they can often aid in increasing usable bandwidth (Lithgow, 2011). Traffic management practices ultimately allow one kind of 'packet'3 to be delayed over another; for example, ISPs often use a program called Deep Packet Inspection (DPI), which is a program that can identify forms of traffic online, meaning it can target specific applications. Since ITMPs can target specific 'packets' online, smaller interest groups, and businesses became increasingly concerned that network neutrality policy principles, such as 'common-carriage'4 was not being enforced by the CRTC. This paper will identify the main concerns of utilizing ITMP on broadband networks, and will illustrate that ITMP can and should be connected to the discussion regarding network neutrality in Canada" -- From the introduction, page 1.

2021 ◽  
Author(s):  
Natalie Andrusko

"Telecommunications technology has dramatically transformed an individual's ability to access information. Internet surfers are often unaware of the ways in which their Internet services are being managed, and even fewer are familiar with the term Internet neutrality. As a growing trend, more Internet Service Providers (ISPs) in Canada are intervening with the infrastructure of the Internet by utilizing traffic management practices, such as bandwidth 'throttling'1, which hinder a user's ability to quickly access certain types of content online. Internet traffic management practices (ITMP) are a means for ISPs to control their 'congested'2 networks, with the aim of optimizing or improving their network's performance, or they can often aid in increasing usable bandwidth (Lithgow, 2011). Traffic management practices ultimately allow one kind of 'packet'3 to be delayed over another; for example, ISPs often use a program called Deep Packet Inspection (DPI), which is a program that can identify forms of traffic online, meaning it can target specific applications. Since ITMPs can target specific 'packets' online, smaller interest groups, and businesses became increasingly concerned that network neutrality policy principles, such as 'common-carriage'4 was not being enforced by the CRTC. This paper will identify the main concerns of utilizing ITMP on broadband networks, and will illustrate that ITMP can and should be connected to the discussion regarding network neutrality in Canada" -- From the introduction, page 1.


2011 ◽  
Vol 13 (7) ◽  
pp. 1142-1160 ◽  
Author(s):  
Ralf Bendrath ◽  
Milton Mueller

Advances in network equipment now allow internet service providers to monitor the content of data packets in real-time and make decisions about how to handle them. If deployed widely this technology, known as deep packet inspection (DPI), has the potential to alter basic assumptions that have underpinned internet governance to date. The article explores the way internet governance is responding to deep packet inspection and the political struggles around it. Avoiding the extremes of technological determinism and social constructivism, it integrates theoretical approaches from the sociology of technology and actor-centered institutionalism into a new framework for technology-aware policy analysis.


Author(s):  
Maria Löblich

Internet neutrality—usually net(work) neutrality—encompasses the idea that all data packets that circulate on the Internet should be treated equally, without discriminating between users, types of content, platforms, sites, applications, equipment, or modes of communication. The debate about this normative principle revolves around the Internet as a set of distribution channels and how and by whom these channels can be used to control communication. The controversy was spurred by advancements in technology, the increased usage of bandwidth-intensive services, and changing economic interests of Internet service providers. Internet service providers are not only important technical but also central economic actors in the management of the Internet’s architecture. They seek to increase revenue, to recover sizable infrastructure upgrades, and expand their business model. This has consequences for the net neutrality principle, for individual users and corporate content providers. In the case of Internet service providers becoming content providers themselves, net neutrality proponents fear that providers may exclude competitor content, distribute it poorly and more slowly, and require competitors to pay for using high-speed networks. Net neutrality is not only a debate on infrastructure business models that is carried out in economic expert circles. On the contrary, and despite its technical character, it has become an issue in the public debate and an issue that is framed not only in economic but also in political and social terms. The main dividing line in the debate is whether net neutrality regulation is necessary or not and what scope net neutrality obligations should have. The Federal Communications Commission (FCC) in the United States passed new net neutrality rules in 2015 and strengthened its legal underpinning regarding the regulation of Internet service providers (ISPs). With the Telecoms Single Market Regulation, for the first time there will be a European Union–wide legislation for net neutrality, but not recent dilution of requirements. From a communication studies perspective, Internet neutrality is an issue because it relates to a number of topics addressed in communication research, including communication rights, diversity of media ownership, media distribution, user control, and consumer protection. The connection between legal and economic bodies of research, dominating net neutrality literature, and communication studies is largely underexplored. The study of net neutrality would benefit from such a linkage.


2012 ◽  
Vol 9 (4) ◽  
pp. 348-364 ◽  
Author(s):  
Milton Mueller ◽  
Andreas Kuehn ◽  
Stephanie Michelle Santoso

Deep Packet Inspection (DPI) and other network surveillance techniques have become important factors in the policy debate over online copyright infringement. These new technical capabilities reopened an old debate about the responsibility of internet service providers (ISPs) for policing the internet. This paper attempts to understand the extent to which new technological capabilities have the power to alter regulatory principles. It examines political conflict and negotiation over proposals to use DPI for online copyright enforcement in the EU and the USA, using a hybrid of actor-network theory from science, technology and society studies and actor-centered institutionalism in political science. It shows that while the technology disrupted a policy equilibrium, neither the EU nor the US applied DPI to copyright policing in a way that realized its radical potential. The key factor preventing such an integrated response was the disjunction between the interests of network operators and the interests of copyright holders.


2012 ◽  
Vol 8 (2) ◽  
pp. 651-676
Author(s):  
J. Gregory Sidak

The "Brazilian bill of rights for internet users," or "marco civil," has been under consideration at the brazilian congress since 2011. Marco civil's provisions for network neutrality have been particularly controversial. Proponents of network neutrality in Brazil advocate for the "equal treatment" of all data packets, including banning internet service providers from offering to content providers the option to purchase enhanced quality of service in the delivery of data packets. These network neutrality rules conflict with the other goals and principles of marco civil-particularly goals to promote internet access, to foster innovation, and to protect the constitutional right of freedom of speech and the free flow of information.


2018 ◽  
Vol 7 (1.9) ◽  
pp. 34
Author(s):  
P S Uma Priyadarsini ◽  
P Sriramya

Today the mobile subscribers can access the internet service whenever they want or wherever they are because of the roaming service. The necessity of accessing pervasively for the developing paradigm of networking such as the Internet of Things (IoT) is accomplished through this facility. In order to provide universal roaming service which is secure and privacy preserving at the multilevel, this paper proposes a privacy-preserving validation which is conditional with access likability called CPAL for roaming service. By utilizing a method of group signature it provides linking function of an anonymous user. This method has the capability to keep the identity of the users concealed and makes the authorized bodies possible to connect all the access information of the same user even without knowing the user’s real identity. In order to connect the access information from the user for enhancing the service, the foreign operators who are authorized or the service providers particularly uses the master linking key possessed by the trust linking server. In order to examine user’s likings, the individual access information is used but user’s identity is not disclosed. Subscribers can further make use of this functionality to probe the service usage without being identified. The proposed method also has the efficiency to simultaneously revoke a group of users. Comprehensive analysis of CPAL demonstrates that it can withstand many security threats and more adjustable in privacy preservation as compared to the other techniques. Assessment of its performance further proves the efficiency of CPAL with regards to communication and computation overhead. Future work would include the extension of CPAL scheme to effectively withstand internal attackers and design the lightweight secure and privacy-preserving scheme that will support IoT devices of large group.


2009 ◽  
Vol 8 (1) ◽  
Author(s):  
Marius Schwartz ◽  
Philip J. Weiser

"Network neutrality" encompasses a wide-ranging debate over what limits, if any, should be placed on network providers in pricing or managing Internet traffic. The articles in this volume tackle various aspects of this debate: Have other transportation networks been truly "neutral"? Should broadband providers be allowed to charge content providers for connecting with end users? How much price discrimination is appropriate and is it confined to network operators? How large are the potential costs of constraining traffic management practices? What are the tradeoffs from mandated loop unbundling to deter discrimination and what market power threshold justifies interventions?


2021 ◽  
Author(s):  
Fenwick Robert McKelvey

This dissertation develops the concept of transmissive control to explore the consequences of changes in Internet routing for communication online. Where transmission often denotes an act of exchanging information between sender and receiver, transmissive control theorizes transmission as the production and assignment of common times or temporalities between components of a communication system. Transmissive control functions both operationally according to how computational algorithms route Internet data (known as packets) and systematically according to how patterns in these operations express temporalities of coordination and control. Transmissive control questions how algorithms transmit packets and how transmission expresses valuable temporalities within the Internet. The concept of transmissive control developed as a response to advanced Internet routing algorithms that have greater awareness of packets and more capacity to intervene during transmission. The temporality of the Internet is changing due to these algorithms. Where transmissive control has been made possible by the Internet’s core asynchronous design that allows for many diferent temporalities to be simultaneous (such as real-time networks or time-sharing networks), this diversity has taxed the resources of the Internet infrastructure as well as the business models of most Internet Service Providers (ISPs). To bring the temporality of the Internet back under control, ISPs and other network administrators have turned to transmissive control to better manage their resources. Their activities shift the Internet from an asynchronous temporality to a poly-chronous temporality where network administrators set and manage the times of the Internet. Where this turn to traffic management has often been framed as a debate over the neutrality of the Internet, the dissertation re-orientates the debate around transmissive control. Tactics by the anti-copyright Pirate Bay and Internet transparency projects illustrate potential political and policy responses to transmissive control. The former seeks to elude its control where the latter seeks to expose its operation. These components as well as the operation of transmissive control will be developed through a series of metaphors from the film Inception, the demons of Pandemonium, the novel Moby-Dick and the film Stalker. Each metaphor cooperate to provide a comprehensive discussion of transmissive control.


2021 ◽  
Author(s):  
Fenwick Robert McKelvey

This dissertation develops the concept of transmissive control to explore the consequences of changes in Internet routing for communication online. Where transmission often denotes an act of exchanging information between sender and receiver, transmissive control theorizes transmission as the production and assignment of common times or temporalities between components of a communication system. Transmissive control functions both operationally according to how computational algorithms route Internet data (known as packets) and systematically according to how patterns in these operations express temporalities of coordination and control. Transmissive control questions how algorithms transmit packets and how transmission expresses valuable temporalities within the Internet. The concept of transmissive control developed as a response to advanced Internet routing algorithms that have greater awareness of packets and more capacity to intervene during transmission. The temporality of the Internet is changing due to these algorithms. Where transmissive control has been made possible by the Internet’s core asynchronous design that allows for many diferent temporalities to be simultaneous (such as real-time networks or time-sharing networks), this diversity has taxed the resources of the Internet infrastructure as well as the business models of most Internet Service Providers (ISPs). To bring the temporality of the Internet back under control, ISPs and other network administrators have turned to transmissive control to better manage their resources. Their activities shift the Internet from an asynchronous temporality to a poly-chronous temporality where network administrators set and manage the times of the Internet. Where this turn to traffic management has often been framed as a debate over the neutrality of the Internet, the dissertation re-orientates the debate around transmissive control. Tactics by the anti-copyright Pirate Bay and Internet transparency projects illustrate potential political and policy responses to transmissive control. The former seeks to elude its control where the latter seeks to expose its operation. These components as well as the operation of transmissive control will be developed through a series of metaphors from the film Inception, the demons of Pandemonium, the novel Moby-Dick and the film Stalker. Each metaphor cooperate to provide a comprehensive discussion of transmissive control.


2021 ◽  
Vol 5 (3) ◽  
pp. 244-259
Author(s):  
Satriyo Widhi Pamungkas

The problem of net neutrality has become a debate in many countries where the regulation on the net neutrality policy confirms that internet providers or Internet Service Providers (ISPs) are not allowed to make distinctions or be discriminatory in the selection of internet applications or content to be used by consumers or users. The purpose of this research is to analyze the application of network neutrality from the perspective of Indonesian law which specifically examines critically the applicable Information and Electronic Transactions Law. This research method is descriptive qualitative. The results show that the implementation of Net Neutrality in terms of the Information and Electronic Transactions Law is still not optimal because there are still network restrictions that are applied to certain Internet Network Providers. The results also show that there is a need for amendments to the ITE Law related to the enforcement of legal protection with the principle of forming a prohibition against the actions of Internet Service Provider (ISP) business actors that can disrupt the business climate.


Sign in / Sign up

Export Citation Format

Share Document