In 1994, Al Gore said:
How can government ensure that the nascent Internet will permit everyone to be able to compete with everyone else for the opportunity to provide any service to all willing customers? Next, how can we ensure that this new marketplace reaches the entire nation? And then how can we ensure that it fulfills the enormous promise of education, economic growth and job creation?
—Al Gore, 1994
PROS AND CONS OF NET-NEUTRALITY, YOU DECIDE...
- Bandwidth availability:
There is only a limited amount of bandwidth available at any given time for all of the applications that access the internet. As such, it is necessary to separate applications in order to insure that essential programs, such as internet browsers and email, get sufficient bandwidth, while still leaving some bandwidth for non-essential uses, like games.
First Priority applications are programs with normal bandwidth demands that support general Internet use and access to other basic services that do not typically require the sharing of large files.
High Priority applications are programs with variable bandwidth demands that periodically consume large amounts of network resources. Some of these applications, like instant messaging, also require dedicated network bandwidth in order to keep the applications functioning properly. These general groups of applications are given high priority when assigning available bandwidth, and include Web, FTP, Real Player, Quick Time, Windows Media, and instant messenger programs.
Low Priority applications, such as digital media sharing and network gaming applications can use an extremely large amount of the network resources . High demand applications are given a lower priority than applications demanding lower amounts of bandwidth, as more priority is given to bandwidth that benefits all users, such as web traffic and e-mail traffic. As the level of web traffic and e-mail traffic grows throughout the day, users of these applications may experience slower rates, as less bandwidth is available to run these applications as it is allocated to the higher priority applications. - Data discrimination:
ISPs have engaged in data disrimination; In 2004, a small North Carolina telecom company, Madison River Communications, blocked their DSL customers from using the Vonage VoIP service. Service was restored after the Federal Communications Commission (FCC) intervened and entered into a consent decree. In April 2006, Time Warner's AOL (America On Line) blocked all e-mails that mentioned www.dearaol.com, an advocacy campaign opposing the company's pay-to-send e-mail scheme. An AOL spokesman called the issue an unintentional glitch. In October 2007, Comcast was found to be preventing or at least severely delaying uploads on BitTorrent. - Quality of service:
Refers to the capability of a network to provide better service to selected network traffic over various technologies, including Frame Relay, Asynchronous Transfer Mode (ATM), Ethernet and 802.1 networks, SONET, and IP-routed networks that may use any or all of these underlying technologies. The primary goal of QoS is to provide priority including dedicated bandwidth, controlled jitter and latency (required by some real-time and interactive traffic), and improved loss characteristics. Also important is making sure that providing priority for one or more flows does not make other flows fail. QoS technologies provide the elemental building blocks that will be used for future business applications in campus, WAN, and service provider networks. - Peer-to-peer filesharing:
Peers are both suppliers and consumers of resources, in contrast to the traditional client-server model where only servers supply, and clients consume. Peer-to-peer was popularized by file sharing systems like Napster. Peer-to-peer file sharing networks have inspired new structures and philosophies in other areas of human interaction. In such social contexts, peer-to-peer as a meme refers to the egalitarian social networking that is currently emerging throughout society, enabled by Internet technologies in general.
Internet service providers (ISPs) have been known to throttle P2P file-sharing traffic due to the high-bandwidth usage. Compared to Web browsing, e-mail or many other uses of the internet, where data is only transferred in short intervals and relative small quantities, P2P file-sharing often consists of relatively heavy bandwidth usage due to ongoing file transfers and swarm/network coordination packets. A possible solution to this is called P2P caching, where a ISP stores the part of files most accessed by P2P clients in order to save access to the Internet. - Pricing models:
Computers: This consists of smartphones, netbooks and notebooks.
E-readers: The Kindle has made this a familiar category, the idea of including the cost of access with a subscription is a strong model, but there may also be ways to charge monthly or session-based fees for data access.
Location-Based Services: These are services for tracking children, pets packages, etc. Annual subscription plans or even including a one-time wireless transport charge when someone buys the device are possible models.
Everything Else: On the consumer side, this includes things like having a digital camera with 3G access than can ship photos to a picture frame or cell phone.