Study: Comcast, Cox slowing P2P traffic around the clock
Comcast insists it only limits some P2P during peak congestion
IDG News Service - WASHINGTON -- U.S. cable broadband providers Comcast Corp. and Cox Communications Inc. are slowing BitTorrent traffic at all times of the day, not just during peak traffic, according to a new study by a German computer research group.
Comcast has insisted that it uses network management techniques to slow some peer-to-peer traffic during times of peak congestion, but the study from the Max Planck Institute for Software Systems suggests that Comcast and Cox are slowing BitTorrent traffic "independent of the time of day."
The study, using more than 8,000 nodes worldwide to test for BitTorrent blocking, found that Comcast was interrupting at least 30% of BitTorrent upload attempts around the clock. At noon, Comcast was interfering with more than 80% of BitTorrent traffic, but it was also slowing more than 60% of BitTorrent traffic at other times, including midnight, 3 a.m. and 8 p.m. EDT in the U.S., the time zone where Comcast is based, according to tests run by users of the institute's Glasnost network testing tool.
Cox was interfering with 100% of BitTorrent traffic at 1 a.m., 4 a.m. and 5 a.m., also EDT, according to the tests.
Comcast downplayed the results. P-to-p traffic makes up 50% to 90% of a network's traffic, and BitTorrent users can be on the network at any time, said Comcast spokeswoman Sena Fitzmaurice. That means network congestion from BitTorrent doesn't just happen in the middle of the day, she added.
"P-to-p traffic doesn't necessarily follow normal traffic flows," Fitzmaurice said.
The Internet users who participated in the study may not be representative of Internet users overall, she added. The users who run the Glasnost tests may be "heavy users of p-to-p," Fitzmaurice said.
Cox did not have an immediate comment on the study.
Comcast issued a statement repeating its earlier position that it "does not, has not and will not block any Web sites or online applications," including BitTorrent.
"We have acknowledged that we manage peer-to-peer traffic in a limited manner to minimize network congestion," Comcast's statement continued. "While we believe our current network management approach was a reasonable choice, we are now working with a variety of companies, including BitTorrent, [to] move to a protocol-agnostic network management technique."
Comcast announced in March that it would work with BitTorrent to come up with new network management techniques.
The Max Planck Institute's study seems to confirm testimony by U.S. Federal Communications Commission Chairman Kevin Martin, who told U.S. lawmakers in April that Comcast's interference with BitTorrent traffic appeared to be widespread.
Comcast's actions, first reported by the Associated Press last October, appeared to "block uploads of a significant portion of subscribers" in that part of the network, even during times when the network wasn't congested, Martin told a Senate committee. "Based on testimony we've received thus far, this equipment was typically deployed over a wider geographic area or system, and is not even capable of knowing when an individual ... segment of the network is congested."
The study found BitTorrent interference from 11 other Internet services providers, in addition to Comcast and Cox, with seven of those in the U.S. But there was not "widespread" BitTorrent blocking at those ISPs, the study said. The tests looked at 1,224 ISPs worldwide.
Advocacy groups like the Open Internet Coalition, Public Knowledge and Free Press all pointed to the study as evidence that Congress needs to pass Net neutrality legislation prohibiting broadband providers from blocking or slowing Web content.
"Consumers have no reason left to trust their cable company," Ben Scott, policy director of Free Press, said in an e-mail. "[The] sophisticated testing shows that Comcast and Cox block BitTorrent applications at all times of the day -- not just at times of peak traffic. Now is the time to send a clear signal to the market that blocking consumers' access to the lawful Internet content of their choice is out of bounds."
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Networking White Papers | Webcasts