Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs
- Ying Zhang ,
- Z. Morley Mao ,
- Ming Zhang
HotNets |
Published by Association for Computing Machinery, Inc.
On the Internet today, a growing number of QoS sensitive network applications exist, such as VoIP, imposing more stringent requirements on ISPs besides the basic reachability assurance. Thus, the demand on ISPs for Service Level Agreements (SLAs) with better guarantees is increasing. However, despite over provisioning in core ISP networks, resource contention still exists leading to congestion and associated performance degradations. For example, residential broadband networks rate-limit or even block bandwidth intensive applications such as peer-to-peer file sharing there by violating network neutrality. In addition, traffic associated with specific applications, such as Skype, could also bed is criminated against for competitive business reasons. So far, little work has been done regarding the existence of traffic discrimination inside the core of the Internet. Due to the technical challenges and widespread impact, it seems somewhat inconceivable that ISPs are performing such fine grained discrimination based on the application content. Our study is the first to demonstrate evidence of network neutrality violations within backbone ISPs. We used a scalable and accurate monitoring system– NVLens – to detect traffic discrimination based on various factors such as application types,previous-hop, and next-hop A Ses. We discuss the implication of such discrimination and how users can counter such unfair practices.
Copyright © 2007 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Publications Dept, ACM Inc., fax +1 (212) 869-0481, or permissions@acm.org. The definitive version of this paper can be found at ACM's Digital Library --http://www.acm.org/dl/.