Thread: Traffic Shaping
View Single Post
Old 01-04-2006, 10:32   #106
Fawkes
Inactive
 
Fawkes's Avatar
 
Join Date: Oct 2003
Location: Manchester
Age: 48
Services: VM: 120M Broadband, TV + Landline
Posts: 471
Fawkes has a reputation beyond reputeFawkes has a reputation beyond reputeFawkes has a reputation beyond reputeFawkes has a reputation beyond reputeFawkes has a reputation beyond reputeFawkes has a reputation beyond reputeFawkes has a reputation beyond reputeFawkes has a reputation beyond reputeFawkes has a reputation beyond reputeFawkes has a reputation beyond reputeFawkes has a reputation beyond reputeFawkes has a reputation beyond reputeFawkes has a reputation beyond repute
Re: Traffic Shaping

Quote:
Originally Posted by Toto
Agreed.

Traffic shaping on the level that ntl appear to be implamenting cannot be done at the human level, the hardware ntl will need to install will do all that for them. Obviously there will be traffic data that will be analysed by humans, but it is largely data flow based on volume over time and port traffic and there will be insufficient time for human intervention to make this work properly that would breach any privacy issues.
Don't be so sure:

Quote:
Verizon, Comcast, Bell South and other communications giants are developing strategies that would track and store information on our every move in cyberspace in a vast data-collection and marketing system, the scope of which could rival the National Security Agency. According to white papers now being circulated in the cable, telephone and telecommunications industries, those with the deepest pockets--corporations, special-interest groups and major advertisers--would get preferred treatment. Content from these providers would have first priority on our computer and television screens, while information seen as undesirable, such as peer-to-peer communications, could be relegated to a slow lane or simply shut out.

Taken from here.

EDIT:

Quote:
These "deep packet inspection" technologies are partly designed to make sure that the Internet pipeline doesn't become so congested it chokes off the delivery of timely communications. Such products have already been sold to universities and large businesses that want to more economically manage their Internet services. They are also being used to limit some peer-to-peer downloading, especially for music.

But these tools are also being promoted as ways that companies, such as Comcast and Bell South, can simply grab greater control over the Internet. For example, in a series of recent white papers, Internet technology giant Cisco urges these companies to "meter individual subscriber usage by application," as individuals' online travels are "tracked" and "integrated with billing systems." Such tracking and billing is made possible because they will know "the identity and profile of the individual subscriber," "what the subscriber is doing" and "where the subscriber resides."
Fawkes is offline   Reply With Quote