Comcast Declares Truce with P2P
Comcast recently ended hostilities with users of peer-to-peer networks (P2P) last week by agreeing to work with BitTorrent. The agreement, launched hand-in-hand with the one of the inventors of the BitTorrent protocol, is meant to find solutions to bandwidth management issues. Comcast and BitTorrent intend to publish their findings so that other P2P's and Internet Service Providers (ISPs) can adapt their solutions.
Previously, the cable company had restricted heavy usage of P2P networks using a practice known as 'torrent throttling.' Customers would find their file sharing slow or stop completely, especially during peak hours. (Source: nytimes.com)
The practice first came to light last October after the Associated Press investigated the company's approach to bandwidth management. In February, Washington took an interest in Comcast's practices and the Federal Communications Commission began hearings on the matter.
Consumer advocacy groups are asking the Commission to declare Comcast in breech of the FCC's network management principles which are meant to keep the Internet a "vibrant and competitive free market" as mandated by Congress. (Source: publickknowledge.org)
Before last week's announcement, Comcast had been quick to defend its throttling practices. In a report by The New York Times, Tony G. Werner, Chief Technology Officer for Comcast, fended off suggestions that the company could solve the problem by adding more bandwidth, "Internet service providers in Japan, with the fastest network speeds on the planet, [have] to manage their traffic."
P2P has come into its own recently by stepping out of the shadowy world of illegal file sharing and finding legitimate uses such as commercial video delivery and telephony services like Skype.
Efforts to improve services are ongoing, and customers should not expect changes to their service in the near future. Werner said that Comcast hopes to have its new system ready by the end of this year.
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.