Академический Документы
Профессиональный Документы
Культура Документы
Shane Lunceford*
I. INTRODUCTION
*
Shane Lunceford is a former technical instructor for Excite@Home and Liberate
Technologies, where he taught courses on cable modem, DSL, leased circuit, Video on
Demand, and interactive television technologies. Mr. Lunceford holds a J.D. from Santa
Clara University and a B.S. in Computer Science from California State University, East
Bay.
1
See Donna N. Lampert, No Sight Like Hindsight: The 1996 Act and the View Ten Years
Later 58 FED. COMM. L.J. 519, 528 (2006) (“[H]istory is rife with examples of industry
pleading that regulation is premature and later claiming reliance on no regulation when
regulators seek to step in and address abuses.”).
2
Neutrality: Background and Issues, Cong. Research Serv. (Library of Congress) Order
Code RS22444, at CRS-1 (May 16, 2006).
3
Joshua Gans, No Longer Self Evident: Is All Internet Content Created Equal?, CENTRE
FOR POLICY DEVELOPMENT, Aug. 25, 2006, http://cpd.org.au/article/no-longer-self-
evident:-all-internet-content-created-equal%3F.
4
See Internet Freedom and Nondiscrimination Act, H.R. 5417, 109th Cong. (2006);
Internet Nondiscrimination Act, S. 2360 109th Cong. (2006); Internet Freedom and
Preservation Act, S. 2917, 109th Cong. (2006).
5
Unsolicited commercial email is commonly referred to as “spam.” Hormel Foods, LLC
has taken a position on the use of the word “spam” to describe unsolicited commercial
email. SPAM.com, Privacy Policy, http://www.spam.com/legal/spam (last visited Feb. 9,
2009).
26 Baltimore Intellectual Property Law Journal [Vol. 17
6
Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003, 15
U.S.C. § 7701 (2004); see generally Federal Trade Commission, Spam,
http://www.ftc.gov/spam (last visited Feb. 9, 2009) (providing more information on
unsolicited commercial email and the law).
7
Juniper Networks and other providers offer switches with stateful packet inspection
technology, allowing them to protect network resources and users from spyware, viruses,
and other malware. See Juniper Networks, Intrustion Detection and Prevention (IDP),
http://www.juniper.net/products_and_services (follow “Intrusion Prevention Portfolio”
hyperlink; then follow “Intrusion Detection and Prevention (IDP)” hyperlink) (last visited
Feb. 9, 2009).
8
E.g., Soft32.com, Microsoft Malicious Software Removal Tool,
http://www.soft32.com/download_121631.html (last visited Feb. 9, 2009).
9
Comcast, for example, has offered free virus scanning, privacy, and firewall software for
its customers. Comcast, Security, http://www.comcast.net/Security/SecSuiteSSO/ (last
visited Feb. 9, 2009).
10
Comcast, Ethernet Private Line,
http://www.comcast.com/corporate/business/large/privateline.html?fss=bandwidth (last
visited Feb. 16, 2009) (showing available bandwidth and removal).
11
Comcast, Ethernet Private Line, http://business.comcast.com/ethernet/private-line.aspx
(last visited Feb. 16, 2009) (showing Comcast‟s network security features).
12
Hal Berghel, The Code Red Worm - Malicious Software Knows No Bounds, 44 COMM.
OF THE ACM 15, 19 (2001) (illustrating how the Love Bug, Code Red, and Melissa
worms cost society an estimated $12.5 billion).
13
See e.g., ASSOCIATION OF SUPPORT PROFESSIONALS, TECHNICAL SUPPORT COST RATIOS
(2004).
14
See Lisa Phifer, 2006 MSSP Survey, Part 6: Managed Anti-Spam and Content Filtering,
ISP PLANET, Dec. 22, 2006, http://www.isp-planet.com/technology/mssp/2006/
mssp6a.html.
Fall 2008] Network Neutrality 27
Consumers
Want access to all legal websites and other services available via the
Internet.
Want to use cutting edge network based applications, regardless of
source.
Want to be able to connect devices to the Internet to enhance their
Internet experience.
argument, it shows that the proposed legislation is drafted with the interest of only one
party in mind. Id. Also consider the fact that all current proposed legislation requires
that all content providers are given the same treatment as affiliates. Id. This may mean
that ISPs which have content stored on their network have to provide space for other
content providers to store content. If this is the case, what is the point of being an
affiliate?
21
Arshad Mohammad, SBC Head Ignites Debate, WASH. POST, Nov. 4, 2005, at D01.
22
Save the Internet.com, Frequently Asked Questions, http://www.savetheinternet.com/=
faq (last visited Feb. 12, 2009).
Fall 2008] Network Neutrality 29
23
See Posting of amacd to http://news.zdnet.com/2100-9588_22-
6081882.htmlhttp://news.zdnet.com/5208-9588-
0.html?forumID=1&threadID=21892&messageID=416797&start=-1 (June 6, 2006)
(discussing the “propagandist framing of terms such as „net neutrality‟ and „death tax‟.”).
24
See Thierer, supra note 17, at 2.
25
Id.
26
See Jeff Tyson, How Stuff Works, How the Internet Infrastructure Works,
http://www.howstuffworks.com/internet-infrastructure.htm/printable (last visited Feb. 12,
2009).
27
Id.
28
Id.
30 Baltimore Intellectual Property Law Journal [Vol. 17
their own respective local networks.29 Likewise, they are only capable of
receiving and honoring requests that originate from their own respective
local networks.30 If these networks decide to interconnect with one another,
information may be shared between them, subject to the will of each private
network operator.31
The Internet consists of many such networks that are interconnected,
but the means of interconnection is less direct than, for example, a few
neighbors deciding to run cables out of their windows to the business or
residence next door. Broadband ISPs build networks capable of handling
extremely large amounts of data, and provide access to their networks for a
price. These service providers may in turn buy access to other larger
networks, known as Tier 1 ISPs.32 Tier 1 ISPs, such as AT&T, Verizon
Business, and Level 3, interconnect with one another via private peering or
Network Access Points (NAPs), also known as Internet Exchanges (IXs).33
Private peering and IXs are spread throughout the world, but the nature of
these points, exchanging traffic between competing Tier 1 providers, makes
them the logical core of the Internet, if there is one.34
Everyone who accesses the Internet, which essentially makes them a
part of the Internet, is connected at least indirectly to a Tier 1 ISP. 35 For
example, a customer using Comcast High Speed Internet via a cable modem
may connect to the Comcast network, which, in turn, may connect to the
AT&T network as a Tier 1 provider. Yahoo!, on the other hand, may
connect directly to Level 3, a Tier 1 ISP. Therefore, a cable modem user that
wishes to access content residing on Yahoo!‟s network, such as world news
or web-based email, may connect to the Comcast network. The Comcast
network would connect to AT&T‟s network; AT&T‟s network would
connect to the Level 3 network via private peering or IXs; and the Level 3
29
Id.
30
Id.
31
Id.
32
See Rob Frieden, Revenge of the Bellheads: How the Netheads Lost Control of the
Internet (Oct. 2001) (working paper, Pa State Univ. Coll of Communications and
Dickinson Sch. of Law), available at http://ssrn.com/abstract=290121. Currently, most
Internet traffic in the U.S. travels through private peering arrangements, since the fall of
public Network Access Points (NAPs), such as Metropolitan Area Ethernet (MAE-East),
and the Sprint NAP. Id. This market driven traffic exchanging has allowed broadband
ISPs to keep up with the bandwidth demands of packet-hungry applications such as
video, VoIP, and file sharing technology. Id. Several years ago, high speeds were
impossible outside of a given network due to the congestion that existed at the NAPs. Id.
The workarounds at the time were to pipe in affiliated content through a private
connection and distribute it over the ISP‟s network. Id.
33
See O. Heckmann, et al., Optimizing Interconnection Policies, 46.1 COMPUT. NETW. 19
Mar. 31, 2004, http://www.sciencedirect.com (under “subject” select “Computer
Networks” then select Volume 46, Issue 1) (discussing peering).
34
See Tyson, supra note 26.
35
See Frieden, supra note 32.
Fall 2008] Network Neutrality 31
36
Although this scenario may be accurate, it is meant to be hypothetical and is presented
with company names in order to facilitate understanding of the players involved in such a
network transaction.
37
Save The Internet.com, Frequently Asked Questions, http://www.savetheinternet.com/=
faq (last visited Feb. 12, 2009).
38
Id.
39
For example, some proponents of legislation for network neutrality principles are
convinced that packet prioritization is evil, while others feel that prioritization is fine if it
is not based on the source of the traffic. Anush Yegyazarian and Tom Spring, Should the
Internet Play Favorites?, WASH. POST, Mar. 25, 2006.
40
Save The Internet.com, supra note 37.
32 Baltimore Intellectual Property Law Journal [Vol. 17
create a “fast lane” for those with money, leaving all others to travel the
Internet on a “winding dirt road.”41 They claim that “[ISPs] want to be
Internet gatekeepers, deciding which web sites go fast or slow and which
won't load at all.”42 On the other extreme are those who claim that content
providers simply want to use broadband provider pipes without paying for
them.43 These extremes do not really represent what the network neutrality
debate is about, and simply create polarizing straw man arguments.
However, the legislation that has been proposed by some members of
Congress would indeed have the effect of making network providers
responsible for ensuring that their customers have a certain level of service
and speed to destinations on networks which they have no control over.44
The Internet Freedom Preservation Act would have required that a broadband
provider:
This would force ISPs to ensure that all content on the Internet is available to
users at the same speed as content provided by affiliates of the ISP. There is
no mention of a requirement for content providers to ensure that adequate
bandwidth is purchased to deliver content to the edge of the broadband
provider‟s network.
For example, if Website A, a popular high-bandwidth streaming
video site, purchased only ten percent of the bandwidth required to deliver
the content requested by its users at the speed necessary to compete with
Website B, another streaming video content provider affiliated with a
particular broadband service provider, by the language of the Internet
Freedom Preservation Act, the broadband service provider would have to
either (1) provide bandwidth to make up the difference in speed, or (2) lower
the delivery speed of affiliated content to match that of the non-affiliated
site.46 But, there is also the possibility that Website C, a different non-
affiliated site that offers streaming video, has provided more than enough
41
Id.
42
Id.
43
See O'Connell, supra note 20.
44
See Internet Freedom Preservation Act, S. 2917, 109th Cong. (2006).
45
Id. at § 12(a)(4)(B).
46
Id. at § 12(a)(4). This section is written in a way that requires broadband ISPs to actually
enable higher network transmission speeds for content providers. This goes beyond mere
neutrality, which would only require that ISPs not interfere with the priority of packets
based on source.
Fall 2008] Network Neutrality 33
47
“Duty of Broadband Service Providers – With respect to any broadband service offered
to the public, each broadband service providers shall not block, interfere with,
discriminate against, impair, or degrade the ability of any person to use a broadband
service to access, use, send, post, receive, or offer any lawful content, application, or
service made available via the Internet.” Id. at § 12(a)(1).
48
Id.
49
See Michael Geist, supra note 18 (discussing the comments of Canadian ISP Videotron
and the likelihood of port blocking and discussing Canadian cable provider and
broadband ISP Shaw‟s plans to offer prioritization of VoIP traffic for a fee, possibly
leading to the waiver of that fee for Shaw voice subscribers, effectively charging users
who use a third party system).
50
See Madison River Communications, LLC, 20 F.C.C.R. 4295, 4297 (Mar. 3, 2005)
(consent decree). In Madison River, VoIP ports were disabled by an ISP, but the FCC
took swift action and started an investigation. Id. The investigation lasted less than a
month before the FCC entered into a consent decree, accepting $15,000 for its troubles
while Madison River re-opened VoIP ports. Id.
51
Info. Sciences Inst., Univ. S. Cal., Internet Protocol, DARPA Internet Program Protocol
Specification, RFC 791, Sept. 1981, available at
http://www.javvin.com/protocol/rfc791.pdf (discussing how packets are essentially
containers for data).
52
See David L. Cohen, Statement at the Federal Communications Commission Public en
banc Hearing on “Broadband Network Management Practices,” WC Doc. No. 07-52,
(Feb. 25, 2008), available at
http://www.fcc.gov/broadband_network_management/022508/cohen.pdf.
53
See Ryan Kim, FCC Hears Net Neutrality Arguments at Stanford, S.F. CHRONICLE, Apr.
18, 2008.
34 Baltimore Intellectual Property Law Journal [Vol. 17
content is only prioritized based on application and not based on the source
or destination of the traffic, i.e., content provider.
Now that I have laid down the basics of Internet traffic and explored
some preliminary definitions of the problem at hand, this section will
introduce some new players and situations into the illustrations. This will
help define the core problems that network neutrality proponents seek to
address and define the actual public policy at stake.
54
Common Tier 1 providers include AT&T, Verizon, and Level 3.
55
“OC” stands for Optical Carrier, and refers to the speed of a fiber-optic network
connection. Webopedia, What is OC?, http://www.webopedia.com/TERM/O/OC.html
(last visited Feb. 12, 2009).
56
Websites for companies Amazon, CNN, and YouTube are a good example.
Fall 2008] Network Neutrality 35
market for eyeballs57 that they can advertise or sell to. However, the
broadband ISP is not necessarily required to upgrade the amount of
bandwidth available to its users. The argument that any additional
bandwidth provided to users needs to be allocated evenly, or “neutrally”
among content providers lacks merit when the alternative is considered. A
broadband ISP may simply refuse to add bandwidth, keeping the pie smaller,
but still net neutral.58 An argument that customers would not stand for this
would show that there is sufficient competition in the marketplace to cause
customers to choose a different ISP.59
If traffic shaping technology is applied only to current bandwidth, as
opposed to additional bandwidth, an inequity may be seen when compared
with the current state of things. If there is so much priority traffic that only
priority traffic gets through, then the effect would be to block sites that do
not pay for priority. This is an unlikely scenario for several reasons. First,
network operators are slow to make comprehensive, sweeping changes to
their networks without purchasing the additional bandwidth to make the
change unnoticeable to customers for fear of losing customers who notice a
degradation in service.60 This makes financial sense, because the acquisition
cost of a broadband customer eats up the profit gained from that customer for
some time after acquisition.61 The cost and frustration of fielding customer
service calls related to a noticeable change in the service is also a deterrent.62
Second, speed of service has become a way to differentiate providers from
one another in today‟s broadband market.63 To keep up with the demands of
Internet users, broadband ISPs are more likely to continue upgrading and
57
“Eyeballs” is a slang term used in marketing, which represents the number of people
viewing content or advertising. Netlingo, Eyeballs, http://www.netlingo.com/dictionary.
php (follow “e” hyperlink; then follow “eyeballs” hyperlink under “start here”) (last
visited Oct. 17, 2008).
58
This argument was made when the regulation of DSL was first discussed and the
argument failed. The net neutrality argument is different, however, because the benefit of
prioritization of traffic is substantially lower for the network owner than it is for a content
provider. With DSL, there was an obvious new revenue stream (from Internet access
subscription fees) that would drive the Incumbent Local Exchange Carriers (ILECs) such
as Verizon to market anyway. Here, if there is no more money to be made, then complete
neutrality would be better for business than selective prioritization. See Kevin Fayle,
Appeals Court Rubber Stamps FCC's DSL (De)regulation, THE REGISTER, Oct. 24, 2007,
http://www.theregister.co.uk/2007/10/24/fcc_dsl_regulation_appeal_ruling/.
59
See Angele A. Gilroy, Net Neutrality: Background and Issues, CRS Report for Congress,
at 4 (May 16, 2006), available at http://www.fas.org/index.html (under “search” type
Angele A. Gilroy; follow “Net Neutrality: Background and Issues” hyperlink)
60
This observation is based on the author‟s personal experience.
61
See Mark Mahaney, Netflix - Subscriber Acquisition Costs and Churn, SEEKING ALPHA,
Dec. 22, 2005, http://seekingalpha.com/article/5258-netflix-subscriber-acquisition -costs-
and-churn-nflx.
62
See ASSOCIATION OF SUPPORT PROFESSIONALS, TECHNICAL SUPPORT COST RATIOS (2004).
63
Comcast is currently offering speeds of 6 to 12 Mbps to its customers. See Comcast,
High-Speed Internet, http://www.comcast.com/Corporate/Learn/HighSpeedInternet/high
speedinternet.html?lid=2LearnHSI&pos=Nav (last visited Feb. 25, 2009).
36 Baltimore Intellectual Property Law Journal [Vol. 17
adding new bandwidth.64 If cable modem users feel that they are not
receiving the premium service that they are paying for, they are likely to
switch to the less expensive and usually slower DSL service.65 Although not
everyone has a choice, the new numbers of deployment are nearing 100% of
homes passed for both cable and telephone companies in the United States.66
Another issue is that there are multiple network operators involved.
Tier 1 Provider A is a network service provider for an ISP. The ISP has an
interest in managing its network, and prioritization at this level is often
ignored.67 Although they are not directly providing broadband services to the
public in this particular scenario, the effect of traffic prioritization across the
Tier 1 Provider A network is similar to the effect of prioritizing traffic across
any given broadband network. Because end-to-end prioritization is difficult
to achieve,68 prioritization schemes will most likely end at the edge of the
network on which they are implemented. However, if a particular content or
application provider is a customer of the same Tier 1 provider as the
broadband service provider, Internet traffic traveling between the customer
and content provider may possibly never pass through more than one Tier 1
provider, and there may be a greater advantage to prioritizing traffic through
that Tier 1 provider. Therefore, any public policy regarding traffic shaping
technology must consider the role of all network providers involved, not just
broadband ISPs.
64
See Keith Reed, Comcast Upgrade Speeds up Downloads, BOSTON GLOBE, June 2, 2006,
available at
http://www.boston.com/business/technologyarticles/2006/06/02/Comcast_upgrade_speed
s_up_downloads.
65
High Speed Internet, DSL vs. Cable, http://high-speed-internet-access-guide.com/dsl-vs-
cable.html (last visited Feb. 15, 2009).
66
See Competitive Analysis of DSL and Cable Modems, COMMC‟N MEDIA ANALYSIS GROUP
QUARTERLY ANALSYS (Pike & Fischer, Silver Spring, MD.), 4th Quarter 2004, available
at http://www.broadband-daily.com/crossIA.asp. These are 2004 deployment numbers
and the numbers have increased since.
67
This observation is based on the author‟s personal experience.
68
End-to-end prioritization is difficult to achieve because all networks from one end to
another must agree to carry the prioritization scheme in order for the scheme to work, and
these networks are often owned by different entities with competing interests. Although
end-to-end prioritization is difficult to achieve, there are instances in which it may occur.
If a content provider can ensure prioritization by buying bandwidth from a provider that
the ISP buys from, they may be able to make a deal with the provider to carry the
prioritization scheme.
Fall 2008] Network Neutrality 37
area.69 The ISP exchanges traffic with the general Internet through the use of
leased lines from network providers like hypothetical Provider E, a Tier 1
provider,70 but manages the connections up to the Provider E backbone,
where prioritization schemes are lost. VoIP Provider offers VoIP service and
wishes to maintain a higher quality of service for its own VoIP traffic than
other types of traffic, such as email and web browsing. The VoIP service
requires that the user have access to the Internet via an IP network such as
the one provided by ISP. (See Fig.3)
72
As a veteran web developer, I used to negotiate bandwidth requirements and loading time
with clients when creating websites. I continued to optimize web pages for fast loading
and efficient bandwidth use, but clients simply assumed that websites would load quickly
because of the increasing number of Internet users with broadband Internet access.
Increasing network speeds took optimization off the table. Many web developers have
become lazy and less experienced web developers often skip optimization altogether.
When bandwidth has no cost to the application provider, there is little incentive to
innovate in a way that saves bandwidth.
Fall 2008] Network Neutrality 39
73
See Madison River Communications, LLC, 20 F.C.C.R. 4295, 4297 (Mar. 3, 2005)
(consent decree).
74
See generally Christopher S. Yoo, Network Neutrality and the Economics of Congestion,
94 GEO. L.J. 1847, 1862-63 (2006) (outlining the historical progression of Internet usage
from simple email programs to high volume file-sharing and other high bandwidth usage
programs).
75
See generally Douglas A. Haas, Comment, The Never-Was-Neutral Net and Why
Informed End Users Can End the Net Neutrality Debates, 22 BERKELY TECH L.J. 1565,
1579-82 (2007) (describing how Sprint, UUNET, Advanced Network Services, BBN
Planet, MCI, and AT&T entered reciprocal peering agreements to form the backbone of
the Internet as high bandwidth content overloaded individual private networks).
40 Baltimore Intellectual Property Law Journal [Vol. 17
76
See Yoo, supra note 74, at 1871.
77
See AT&T, AT&T Global IP Network Settlement Free Peering Policy, available at
http://www.att.com/peering (last visited Feb. 25, 2009).
78
See Yoo, supra note 74, at 1871.
79
See Equinix, Equinix Peering Portal, http://www.equinix.com/peering (last visited Oct.
29, 2008).
Fall 2008] Network Neutrality 41
of network resources does not seem to bother some of the corporations that
are adamant about net neutrality.80
This hypothetical illustrates that by virtue of strategic network
presence at many of these private peering points and content distribution
networks, those with the resources can buy performance, even if content is
not prioritized.81 As Lawrence Lessig stated at the Gilder-Forbes Telecom
Summit in October, 2006, “There‟s of course an advantage that eBay and
Google have because they have very fast caching servers located all over the
world. So their ability to serve content is better than their competitors.”82
Thus, even on a net neutral Internet, some content providers are more equal
than others.83 This is not to say that neutral content delivery does not solve
the problem, but rather, that the nature of the Internet rewards individuals
and organizations in proportion to their investment and planning.
80
See e.g. Comcast, Comcast FAQ, http://www.comcast.com/Customers/FAQ/FaqDetails.
ashx?Id=4390 (last visited Oct. 29, 2008).
81
See Hands Off the Internet, Lessig is More, HANDS OFF THE INTERNET, Oct. 23, 2006,
http://www.handsoff.org/blog/tiered-service/lessig-is-more .
82
Id.
83
Id. But c.f. Letter from Tim Wu, Associate Professor, Univ. of Virginia Sch. of Law, and
Lawrence Lessig, Professor of Law, Stanford Law Sch., to Marlene C. Dortch, Secretary
FCC (Aug. 22, 2003), available at http://freepress.net/files.wu_lessig_fcc.pdf.
(discussing ex parte the current policy of the FCC in regulating the Internet to bolster
competition). The beneficiaries of net neutrality are supposed to be the “little guys” that
do not have the money to compete. Id. But, in a net neutral world, the content providers
with the means to build data centers logically close to the broadband users have an
advantage; unless, that is, we accept the idea that the network operators have to actually
provide the infrastructure to level the playing field for the have-nots. Id.
42 Baltimore Intellectual Property Law Journal [Vol. 17
the effect of network management and traffic shaping, rather than the traffic
shaping technology itself. 84
Electric Company knew that the available bandwidth would soon
increase, so it is obvious that Electric Company meant to implement a policy
that only allowed a particular percentage of bandwidth to be used for Peer to
Peer Application traffic. Electric Company users will likely be happy with
the increased bandwidth, but unhappy if they find out that their favorite
application cannot take full advantage of the network‟s new capabilities.
Furthermore, customers who use Peer to Peer Application infrequently are
being rate-limited simply because of the application they are using.
Tim Wu, a respected professor at Columbia Law School who studies
net neutrality, feels it is helpful to look at other networks implicitly built on a
neutrality theory when thinking about neutrality on the Internet.85 On his
website, Wu states:
Setting aside the fact that Electric Company is delivering Internet access via
the electric grid, we can see the main problem with this hypothetical is the
associated business model.
The electric grid, as well as the water network and other networks
implicitly built on neutrality are usually metered.87 Although a person may
plug an LED nightlight, toaster, or plasma television into the electric grid and
expect it to function properly, that person does not assume that 24 hours of
plasma television usage will cost the same price as browning two pieces of
toast, or even running the LED nightlight for the same period of time. On the
contrary, consumers expect to pay more when they use more resources such
as electricity. The business model of consumer targeted ISPs, however, is
built on fixed pricing.88
If ISPs charged users based on the number of bytes downloaded,
then the problem raised in this hypothetical would likely never arise. ISPs
84
Id.
85
Tim Wu, Net Neutrality FAQ, http://www.timwu.org/network_neutrality.html (last
visited Feb. 15, 2009).
86
Id.
87
See Brett M. Frischmann, An Economic Theory of Infrastructure and Commons
Management, 89 MINN L. REV. 917, 957-59 (discussing infrastructure from a demand
perspective, and the strength and substance of arguments for maintaining certain
infrastructure as “open access.”).
88
See Yoo, supra note 74, at 1853-54.
Fall 2008] Network Neutrality 43
89
Id. at 1863-66.
90
545 U.S. 967 (2005).
91
See id.
92
See Appropriate Framework for Broadband Access to the Internet over Wireline
Facilities, 20 F.C.C.R. 14853, 14862-98 (2005).
93
Nat‟l Ass‟n of Regulatory Util. Comm‟rs v. F.C.C., 533 F.2d 601, 608 (D.C. Cir. 1976)
(quoting Semon v. Royal Indem. Co., 279 F.2d 737, 739 (5th Cir. 1960)).
94
See Frischmann, supra note 87, at 1013-16.
95
See Jerry Ellig & Alastair Walling, Regulatory Status of VoIP in The Post-Brand X
World, 23 SANTA CLARA COMPUTER & HIGH TECH L.J. 89, 121 (2006).
44 Baltimore Intellectual Property Law Journal [Vol. 17
Some argue that the policy statement has no teeth, but it is a clear signal to
cable and DSL broadband service providers that the FCC is aware of the
ability of broadband providers to abuse their newfound freedom.97 However,
the FCC can change direction with any given administration; therefore, any
outcome resulting from enforcement of this policy may be difficult to
predict.
Madison River, an ISP, blocked ports used by Vonage for VoIP
service, causing the service to fail.98 The FCC initiated an investigation into
Madison River‟s actions on February 11, 2005, but entered into a consent
decree on March 3, 2005.99 Madison River paid $15,000 to the FCC and
reopened the ports for use with Vonage VoIP service.100
Although Madison River makes it clear that the FCC believes it has
the power to regulate this behavior, some felt that an actual ruling would
have been beneficial in defining the limits for network providers and ISPs.101
Additionally, the FCC cited compliance with § 201(b) of the
Communications Act of 1934, as amended,102 as the basis for the initial
investigation, but § 201(b) applies to telecommunications services and not to
data services.103 This, and the fact that the Madison River investigation was
initiated and decided just months before the Supreme Court ruling in Brand
X ,104 leaves commentators with uncertainty on how the FCC might react in a
similar situation today.105 It is possible that the FCC will cite Title 1
ancillary jurisdiction over data services106 and hold service providers
accountable for the policy statements made following DSL deregulation.
96
Press Release, Federal Communications Commission, New Principles Preserve and
Promote the Open and Interconnected Nature of Public Internet (Aug. 5, 2005), available
at http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-260435A1.pdf.
97
United Power Line Council, 21 F.C.C.R. 13281, 13294 (Nov. 7, 2006) (concurring
statement of FCC Commissioner Michael J. Copps, “[W]e are nowhere near finished
defining what being an information service actually means.”). Mr. Copps seems to take
the position that this is what he inherited with implied disapproval, but hopes that
broadband over power lines can be a third true competitor in the broadband market. Id.
98
Madison River Communications, LLC, 20 F.C.C.R. 4295, 4297 (Mar. 3, 2005) (consent
decree).
99
Id.
100
Id.
101
See Neal Hannan et al., Note, Net Neutrality and the FCC: What’s Being Done to Preserve
It., COLUM. SCI. & TECH. L. REV., Mar. 29, 2007, http://www.stlr.org/html/engadget/?
entry=005.
102
47 U.S.C. § 151 (1996).
103
Madison River Communications, LLC, 20 F.C.C.R. at 4296.
104
See id. at 4295.
105
Nat‟l Cable & Telecomm. Ass‟n v. Brand X Internet Servs., 545 U.S. 967 (2005).
106
See Am. Library Ass‟n v. F.C.C., 406 F.3d 689 (D.C. Cir. 2005). The FCC has
“authority to promulgate regulation to effectuate the goals and provisions of the Act even
Fall 2008] Network Neutrality 45
At the time this paper was written, Comcast, one of the largest
providers of broadband Internet access in the nation,107 was under fire for
throttling BitTorrent108 traffic.109 BitTorrent allows for distributed file
downloads and is known for its widespread use by consumers for illegally
downloading copyrighted information, 110 although the technology useful for
purposes other than copyright infringement.111 The technology was created
to save bandwidth for file distributors, by allowing users to download from
locations and other users that are logically closer.112 Although bandwidth
may be saved for providers as well, it is unlikely that bandwidth in the more
limited and expensive last mile will be saved.113 Furthermore, such
technology encourages peer to peer transfers, which will likely increase the
use of more expensive last mile links while decreasing the use of less
expensive leased lines connected to the ISP. But, since this increases the use
of the valuable upstream bandwidth, such applications are likely to be met
with network management by network owners. We are likely to see some
definitive answers from the FCC regarding the throttling of BitTorrent and
other applications soon.
VII. COMPETITION
However, this lack of competition argument does not sit well with others.115
In fact, many overstate the opposite, saying that there is plenty of
competition and that there are new broadband technologies on the horizon.
As with many arguments in the network neutrality debate, there is a
middle ground. The broadband market today is largely a duopoly. Most
broadband service subscribers receive service from either their local
telephone or cable company.116 A duopoly, however, is still competitive,
even if it is not perfect competition.117 William G. Laxton, Jr. pointed out
that “[e]conomic research in 2001 found that the cross-price elasticity of
DSL and cable services was positive, indicating that consumers view the two
products as substitutes.”118 Both telephone and cable companies are at nearly
100% availability for broadband services, with availability for cable at over
97% of homes passed and telephone at over 92%.119
In the United States, Verizon,120 Cingular, and AT&T have already
started to deploy wireless technology capable of delivering 2.0 Mbps to
computers, handheld devices, or smart phones, with actual user experiences
ranging from 741 Kbps to 1.2 Mbps in certain markets. The mobile market
shows an interesting blend between the traditional Internet and wireless
services that are typically seen on mobile phones. Even adamant proponents
of network neutrality feel that it is unclear whether net neutrality applies in
this space.121 But, as the devices we attach to mobile networks evolve, so
will our view of the Internet through those devices. Ultimately, the
distinction may disappear altogether.
Then, there are leased lines, such as T-1 circuits, which may seem
odd to bring into the competition argument, but the price for a T-1 circuit has
114
Geist, supra note 18.
115
See William G. Laxton, Jr., The End of Net Neutrality, 2006 DUKE L. & TECH. REV. 15,
§ I (2006).
116
Internet and Non-Discrimination Act of 2006 S. 2360, 109th Cong. § 2(6) (2006).
117
Lampert, supra note 1, at 528.
118
See Laxton, supra note 115 (discussing the economics behind network neutrality).
119
Pike and Fisher, Competitive Analysis of DSL and Cable Modems: Quarterly Analysis
4th Quarter 2004 (2004), http://www.broadband-daily.com/crossIA.asp. However, note
these are 2004 deployment numbers and they have since increased.
120
See Sascha Segan, Verizon Wireless BroadbandAccess EV-DO, PC MAG, Mar. 2, 2005,
available at http://www.pcmag.com/article2/0,1895,1770829,00.asp (containing a
detailed survey of the Verizon service on the East Coast).
121
Marguerite Reardon, Sony Eriksson Teams with Google, ZD NET, Feb. 28, 2006,
available at http://news.zdnet.com/2100-1035_22-6044057.html. Google will apparently
be the search engine of choice for Sony mobile phones. If any of the proposed net
neutrality legislation were to pass, this would be a clear violation unless Sony gave other
search providers equal access to the customer.
Fall 2008] Network Neutrality 47
122
Quote from Covad Communications on Feb 7, 2008. An unmetered T-1 line to my home
currently costs $329 per month for a 3 year commitment and $359 per month with a one
year commitment. Installation charges will be waived.
123
See J. Martin Network Working Group, Ohio State Univ., There’s Gold in them thar
Networks! or Searching for Treasure in all the Wrong Places, RFC 1402, Jan. 1993,
available at http://www.faqs.org/ftp/rfc/pdf/rfc1402.txt.pdf.
124
While 1.544 Mbps is slower than the 6-8 Mbps download speeds offered by Comcast, the
1.544 Mbps upload speeds are greater than the 384-768 kbps upstream offered by
Comcast. See Comcast, What Speeds are Available with Comcast High Speed Internet,
http://www.comcast.com/customers/faq/FaqDetails.ashx?ID=2580 (last visited Sept. 18,
2008).
125
Quote from Covad Communications on Feb 7, 2008. (Unmetered 1Mbps wireless Super-
T to my home at a cost of $199 per month for a one year commitment. Installation
charges will be waived.)
126
See Posting of Jon Healey to BitPlayer, AOL Parent Revives Usage-Based Billing,
http://opinion.latimes.com/bitplayer/2008/01/aol-parent- revi.html (Jan. 17, 2008).
127
See Comcast, FAQ About Excessive Use, http://www.comcast.com/customers/faq/
FaqDetails.ashx?ID=4566 (last visited Sept. 5, 2008).
48 Baltimore Intellectual Property Law Journal [Vol. 17
128
See Internet Freedom and Nondiscrimination Act, H.R. 5417, 109th Cong. (2006);
Internet Nondiscrimination Act, S. 2360, 109th Cong. (2006); Internet Freedom
Preservation Act, S. 2917, 109th Cong. (2006).
129
H.R. 5353, 110th Cong. (2008).
130
H.R. 5417.
131
Id. at § 3(2)(a)(1).
132
Id. at § 3(2)(c)(1).
133
For example, if a network were near capacity, applications that rely on minimal packet
loss would be seriously impaired, while email and other services would have minimal
problems. Prioritizing the applications that need such treatment would have little effect
on other services, but make a world of difference to the user of the application. See
Kevin Fall & Steve McCanne, You Don’t Know Jack About Network Performance,
QUEUE, May 2005, at 56 (defining “packets” and effect of packet loss on applications);
see also Edward W. Felten, Nuts and Bolts of Network Neutrality, Center for Information
Technology Policy, Princeton University, July 6, 2006, at 4, http://itpolicy.princeton.edu/
pub/neutrality.pdf.
134
S. 2360.
135
Id. at § 4(a)(2)(A).
Fall 2008] Network Neutrality 49
peering for content distribution purposes. Simply put, traversing the Internet
with high-bandwidth content is not good for anyone. It creates an Internet
traffic jam, much like the one that led to the demise of the NAPs.136 Content
that is distributed through a private peering provider by way of a mutual
agreement can help ease this burden.137
Another problem with the Act is that any exceptions, such as spam
blocking, need to be under the control of the customer.138 This assumes that
the network provider has no interest in blocking spyware, malware, spam,
and the like, effectively making the network a dumb pipe at the mercy of its
users.
The Act also attempts to subject all information services, regardless
of technology used, to this regulation.139 On-demand technology is
specifically noted,140 and the Act‟s definition of such technology is listed as
the definition in the Communications Act of 1934,141 but excludes cable
services.142 The definition in the Communications Act is, “a service
providing video programming to subscribers over switched networks on an
on-demand, point-to-point basis, but does not include services providing
video programming prescheduled by the programming provider.”143 This is
disturbing because the network architecture of cable-based on-demand
services fits this description.144 Such technology should be separated from
network neutrality principles due to its non-public nature and logical
separation from the Internet.
Additionally, the Act allows providers to take “reasonable and non-
discriminatory measures to protect the security of the network of such
136
See Geoff Huston, Interconnection, Peering, and Settlements, Internet Society, ISP
Column, at 10 (1999), http://www.isoc.org (search “Huston”; select “Interconnection,
Peering, and Settlements” hyperlink) (providing more information on peering and the
demise of the NAPs).
137
See Equinix, http://www.equinix.com (click on “Investors”; then “Corporate Profile”)
(providing more information on their private peering and content distribution services
and stating Equinix is the leading global provider of network-neutral data centers and
Internet exchange services for enterprise, content companies, and network service
providers).
138
S. 2360 § 4(9)(B)(1)(A).
139
Id. at § 3(1)(A)-(B).
140
Id. at § 3(4)(B).
141
47 U.S.C. § 522 (12) (1996).
142
S. 2360 at § 3(4)(C).
143
47 U.S.C. § 522(12).
144
While addressing schemes that are used to deploy on-demand services over cable
networks, the requirements for providing such services are much different, and more
investment is required. Additional local equipment is needed to ensure that a single
channel does not broadcast the same information for every cable customer for example.
Rather, on-demand technology relies on local control of channel maps, allowing a person
in one city to use the same frequency as a person in another city to view different content
of their choosing. See, mi2n, One in 10 Americans Show a Heavy Preference to Control
Their Media and Entertainment, Music Industry News Network, Mar. 18, 2005,
http://www.mi2n.com/press.php3?press_nb=77926 (providing a description of cable-
based, on-demand services and viewer control).
50 Baltimore Intellectual Property Law Journal [Vol. 17
The Internet Freedom Preservation Act 147 also has problems. The Act states:
The problem with this language is that it puts the burden of an end-
to-end experience on only one player, the ISP.149 The Act also
requires any prioritization be done by application.150 This
requirement ignores the lack of incentive by the network owner to
use prioritization, as discussed in Hypothetical B above.151
This statement assumes what the assessment required in the Act sets out to
prove: that net neutrality legislation is required in order to safeguard the open
marketplace of ideas on the Internet.
The Act further requires the FCC to gather facts related to network
neutrality and management principles.158 Although the FCC‟s own policy
statement would be invoked and the FCC would be asked to determine
whether that policy is being followed, the FCC would also be asked to
determine “with respect to content, applications and services, the historic
economic benefits of an open platform.”159 Again, there is an assumption
that an “open platform,” whatever the meaning, somehow provides an
economic benefit.
Although the Act will do little by itself to enact net neutrality
legislation, it creates a policy that assumes legislation is required gets the ball
rolling.160 Unfortunately, net neutrality is still a solution without a well
defined problem,161 and the problems that can be defined are the result of
business planning and market forces, not an evil technology that needs a
leash.
156
H.R. 5353 at § 12(4).
157
Id.
158
Id. at § 4(a)(2)(A)-(G).
159
Id. at § 4(a)(2)(A)-(E).
160
Id.
161
See Yoo, supra note 74, and accompanying text (citing Peter J. Howe, News from the
Chicago Cable and Telecom Show, BOSTON GLOBE, June 16, 2003, at C2).
162
See Press Release, Federal Communications Commission, New Principles Preserve and
Promote the Open and Interconnected Nature of Public Internet, Aug. 5, 2005, available
at http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-260435A1.pdf.
52 Baltimore Intellectual Property Law Journal [Vol. 17
bright-line rule approach for a balancing test. This test should weigh at least
the following factors:
Taking these factors into account will truly level the playing field.164 If a
bright-line rule is drawn to make a particular technology or use of technology
illegal, we risk the loss of innovation and legitimate positive uses for the
technology that has been limited. We also risk stepping away from the
public policy in an effort to create a law that is easier to draft and interpret, at
the expense of justice, and possibly innovation.
XIV. CONCLUSION
163
There are many factors that can be weighed, but these, in the author‟s opinion, get the
heart of the public policy at issue. Although this would not be the easiest rule to enforce,
it would offer more justice.
164
See Connected: An Internet Encyclopedia, OSI Seven-Layer Model,
http://www.freesoft.org/CIE/Topics/15.htm (last visited Sept. 19, 2008); Ring of Saturn
Internetworking, Seven Layer Model, http://networking.ringofsaturn.com/Protocols/
sevenlayer.php (last visited Sept. 18, 2008); Javvin Network Management and Security,
OSI 7 Layers Reference Model for Network Communication, http://www.javvin.com/
osimodel.html (last visited Sept. 19, 2008).
165
See Yoo, supra note 74 and accompanying text.
166
See Felten, supra note 133.
Fall 2008] Network Neutrality 53
the FCC has adopted a flexible policy 167 that supports the basic network
neutrality principles, and they should be given adequate opportunity to
enforce those policies before forcing new requirements on network operators.
167
See Press Release, Federal Communications Commission, New Principles Preserve and
Promote the Open and Interconnected Nature of Public Internet (Aug. 5, 2005), available
at http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-260435A1.pdf.