NNSquad - Network Neutrality Squad

NNSquad Home Page

NNSquad Mailing List Information

 


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[ NNSquad ] Re: pcap files of the Comcast forgeries?


On 12/18/07, Brett Glass <nnsquad@brettglass.com> wrote:
> Exactly. When P2P software finds a fast connection or a big pipe, it milks
> it for all it can get. In fact,

FALSE. Speaking of the popular and contemporary software in use today,
they act like any other software that speaks to the native network
stack in this regard.  There is nothing special that P2P does to try
to fill a pipe.

> some P2P software, such as Kazaa, attempts
> to turn turn well connected nodes into "supernodes," which consume many
> times the bandwidth of an ordinary node.

FALSE. Supernodes, Ultrapeers, Hubs (named differently depending on
the P2P network) do one, two, or both of two things: indexes some of
their leaves files, and/or provides a way for unfirewalled nodes to
notify firewalled nodes that the unfirewalled node has traffic for it.
Neither one causes intense traffic, and the user is in control of
choosing whether (and how much) to act in that capacity.  Compared to
the traffic created by normal nodes, a normal node with hub overhead
is not even close to twice the normal traffic of a node, let alone
"many times the bandwidth of an ordinary node."

"Supernodes" are, in essence,
> "zombies" or "bots," because they are doing the bidding of the creators
> of the software at the expense of the user and his or her Internet
> provider, both of which lose computing power and bandwidth.

FALSE. They are willingly contributing their own bandwidth and
computational power to the peer to peer network.  Again, P2P
applications do not do anything special in this regard.  They do not
"hack" modems to use more bandwidth than the subscribers purchase from
the ISPs, nor do they offload any of the computational tasks to anyone
except for the users who have configured their clients to act in that
capacity.

> Intellectual property issues aside

FALSE. There are no intellectual property issues that do not also
exist for HTTP, TCP/IP, CAT-6, DOCSIS, or 2435 MHz.

, this is one of the biggest problems
> with P2P software: it is designed to take resources from third parties
> to accomplish the goals of the authors of the software. This is not
> something that anyone concerned with privacy or security should support.

IN YOUR MINORITY OPINION.  However, I'm concerned with both privacy
and security.  I have no special issues with P2P.

It's a great architecture and it is responsible for the Internet
today.  After all, it was P2P that broke through the Mainframe model,
then interconnected disparate networks together to form this powerful
entity of free speech and commerce.  We couldn't stop the P2P Internet
if we wanted to, nor should we.

> --Brett Glass

Robb Topolski

-- 
Robb Topolski (robb@funchords.com)
Hillsboro, Oregon USA
http://www.funchords.com/

                 [ It seems like we have people living in completely
                   different universes, or at least viewing the same
                   evidence through entirely different prisms.  But
                   facts are facts.  Either some particular P2P software
                   "milks [Internet circuits] for all it can get" under
                   certain conditions, or it doesn't.  Let's try to be
                   specific here.  I'd like to see any messages like these
                   to be replete with names and version numbers.  *Which*
                   P2P software is abusive, or not?  I'm tired of P2P
                   being lumped into one big clump as if it's all the
                   same package and has been unchanged since day one.
                   
                   As far as the intellectual property arguments are
		   concerned, that's extremely hazardous ground for ISPs to be
		   dealing with.  If ISPs wish to start making value-based
		   decisions about content, they are likely to find themselves
		   saddled with additional legal and financial exposure in a
		   wide variety of ways from which they are now nominally
		   protected.

                   It is undeniable that there are major, significant, 
                   legal uses for P2P.  As Robb noted above, if we
                   judged TCP/IP broadly based on what proportion of
                   packets were used for spam, phishes, or other illicit
                   activities, we might see calls to ban TCP/IP also.
                 
                                -- Lauren Weinstein
                                   NNSquad Moderator ]