End-to-end arguments in system design
ACM Transactions on Computer Systems (TOCS)
Rethinking the design of the Internet: the end-to-end arguments vs. the brave new world
ACM Transactions on Internet Technology (TOIT)
Tussle in cyberspace: defining tomorrow's internet
IEEE/ACM Transactions on Networking (TON)
Effective capacity: a wireless link model for support of quality of service
IEEE Transactions on Wireless Communications
Four questions that determine whether traffic management is reasonable
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
A Framework for Classification of Traffic Management Practices as Reasonable or Unreasonable
ACM Transactions on Internet Technology (TOIT)
A Dynamic Recursive Unified Internet Design (DRUID)
Computer Networks: The International Journal of Computer and Telecommunications Networking
Why is my internet slow?: making network speeds visible
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
User and ISP Rights of Device Attachment and Device Management
ACM Transactions on Internet Technology (TOIT)
Hi-index | 0.00 |
Net neutrality represents the idea that Internet users are entitled to service that does not discriminate on the basis of source, destination, or ownership of Internet traffic. The United States Congress is considering legislation on net neutrality, and debate over the issue has generated intense lobbying. Congressional action will substantially affect the evolution of the Internet and of future Internet research. In this article, we argue that neither the pro nor anti net neutrality positions are consistent with the philosophy of Internet architecture. We develop a net neutrality policy founded on a segmentation of Internet services into infrastructure services and application services, based on the Internet's layered architecture. Our net neutrality policy restricts an Internet service Provider's ability to engage in anticompetitive behavior while simultaneously ensuring that it can use desirable forms of network management. We illustrate the effect of this policy by discussing acceptable and unacceptable uses of network management.