Showing posts with label Computer networking. Show all posts
Showing posts with label Computer networking. Show all posts

Sunday, December 5

NIPRNet

The Non-classified Internet Protocol Router Network (NIPRNet) is used to exchange sensitive but unclassified information between "internal" users as well as providing users access to the Internet. NIPRNet is composed of Internet Protocol routers owned by the United States Department of Defense (DOD). It was created by the Defense Information Systems Agency (DISA) to supersede the earlier MILNET.
NIPRNet is, by design, a parallel airgapped analogue to the SIPRNet, providing seamless interoperability for unclassified combat support applications, as well as providing a gateway to the public Internet. While the two networks are not intended to logically intersect, occasionally it is seen as necessary to tunnel the encrypted SIPRNet over NIPRNet (SIPR over NIPR).
SIPRNet and NIPRNet are referred to colloquially as sipper-net and nipper-net (or simply sipper and nipper), respectively.


DISA

Saturday, December 4

Network management

Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems. 
Operation deals with keeping the network (and the services that the network provides) up and running smoothly. It includes monitoring the network to spot problems as soon as possible, ideally before users are affected.
Administration deals with keeping track of resources in the network and how they are assigned. It includes all the "housekeeping" that is necessary to keep the network under control.
Maintenance is concerned with performing repairs and upgrades—for example, when equipment must be replaced, when a router needs a patch for an operating system image, when a new switch is added to a network. Maintenance also involves corrective and preventive measures to make the managed network run "better", such as adjusting device configuration parameters.
Provisioning is concerned with configuring resources in the network to support a given service. For example, this might include setting up the network so that a new customer can receive voice service.
A common way of characterizing network management functions is FCAPS—Fault, Configuration, Accounting, Performance and Security.
Functions that are performed as part of network management accordingly include controlling, planning, allocating, deploying, coordinating, and monitoring the resources of a network, network planning, frequency allocation, predetermined traffic routing to support load balancing, cryptographic key distribution authorization, configuration management, fault management, security management, performance management, bandwidth management, Route analytics and accounting management.
Data for network management is collected through several mechanisms, including agents installed on infrastructure, synthetic monitoring that simulates transactions, logs of activity, sniffers and real user monitoring. In the past network management mainly consisted of monitoring whether devices were up or down; today performance management has become a crucial part of the IT team's role which brings about a host of challenges—especially for global organizations.
Note: Network management does not include user terminal equipment.


Technologies

A small number of accessories methods exist to support network and network device management. Access methods include the SNMP, command-line interface (CLIs), custom XML, CMIP, Windows Management Instrumentation (WMI), Transaction Language 1, CORBA, NETCONF, and the Java Management Extensions (JMX).
Schemas include the WBEM, the Common Information Model, and MTOSI amongst others.
Medical Service Providers provide a niche marketing utility for managed service providers; as HIPAA legislation consistently increases demands for knowledgeable providers. Medical Service Providers are liable for the protection of their clients confidential information, including in an electronic realm. This liability creates a significant need for managed service providers who can provide secure infrastructure for transportation of medical data.

See also



(source:wikipedia)

Network administrator

A network administrator is a person responsible for the maintenance of computer hardware and software that comprises a computer network. This normally includes deploying, configuring, maintaining and monitoring active network equipment. A related role is that of the network specialist, or network analyst, who concentrates on network design and security.
The network administrator (or "network admin") is usually the level of technical/network staff in an organization and will rarely be involved with direct user support. The network administrator will concentrate on the overall integrity of the network, server deployment, security, and ensuring that the network connectivity throughout a company's LAN/WAN infrastructure is on par with technical considerations at the network level of an organization's hierarchy. Network administrators are considered Tier 3 support personnel that only work on break/fix issues that could not be resolved at the Tier1 (helpdesk) or Tier 2 (desktop/network technician) levels.
Depending on the company, the Network Administrator may also design and deploy networks. However, these tasks may be assigned to a network engineer should one be available to the company. A network engineer designs, implements, and/or troubleshoots computer networks. In general, a network engineer will not regularly perform system administration tasks, but will instead concentrate on high-level network related duties such as network architecture, network design, choosing of network devices, and network policies. Network engineers will rarely be involved with direct user support, as they are normally placed as tier three support.[1].
The actual role of the Network Administrator will vary from company to company, but will commonly include activities and tasks such as network address assignment, assignment of routing protocols and routing table configuration as well as configuration of authentication and authorization – directory services. It often includes maintenance of network facilities in individual machines, such as drivers and settings of personal computers as well as printers and such. It sometimes also includes maintenance of certain network servers: file servers, VPN gateways, intrusion detection systems, etc.
Network specialists and analysts concentrate on the network design and security, particularly troubleshooting and/or debugging network-related problems. Their work can also include the maintenance of the network's authorization infrastructure, as well as network backup systems.
The administrator is responsible for the security of the network and for assigning IP addresses to the devices connected to the networks. Assigning IP addresses gives the subnet administrator some control over the personnel who connect to the subnet. It also helps ensure that the administrator knows each system that is connected and who is personally responsible for the system.

Duties of a network administrator

Many organizations use a three tier support staff solution, with tier one (help desk) personnel handling the initial calls, tier two (technicians and pc support analysts) and tier three (network administrators). Most of those organizations follow a fixed staffing ratio, and being a network administrator is either the top job, or next to top job, within the technical support department.
Network administrators are responsible for making sure that the computer hardware and network infrastructure for an IT organization is properly maintained. They are deeply involved in the procurement of new hardware (For example: Does it meet existing standardization requirements? Does it do the job required?), rolling out new software installs, maintaining the disk images for new computer installs (usually by having a standardized OS and application install), making sure that licenses are paid for and up to date for software that need it, maintaining the standards for server installations and applications, and monitoring the performance of the network, checking for security breaches, poor data management practices and more.
Most network administrator positions require a breadth of technical knowledge and the ability to learn the ins and outs of new networking and server software packages quickly. While designing and drafting a network is usually the job of a network engineer, many organizations roll that function into a network administrator position as well.
One of the chief jobs of a network administrator is connectivity. Network administrators are in charge of making sure that connectivity works for all users in their organization, and for making sure that data security for connections to the internet is properly handled. (For network administrators doing security aspects, this can be a full time job.)
Trouble tickets work their way through the help desk, then through the analyst level support, before reaching the network administrator's level. As a result, in their day-to-day operations, network administrators should not be dealing directly with end users as a routine function. Most of their jobs should be on scheduling and implementing routine maintenance tasks, updating disaster prevention programs, making sure that network backups are run and doing test restores to make sure that those restores are sound.
Retrieved from "http://www.articlesbase.com/computers-articles/network-administrator-duties-and-functions-1304080.
[edit]Training and certifications for network administrators

Cisco CCENT
Cisco CCNA
Cisco CCIP
Cisco CCNP
Cisco CCIE
Microsoft Certified System Administrator
Microsoft Certified System Engineer
Microsoft Certified IT Professional
CompTIA's Network+
Red Hat Certified Engineer (RHCE)


(source:wikipedia)

Electronics

Electronics is the branch of science and technology which makes use of the controlled motion of electrons through different media. The ability to control electron flow is usually applied to information handling or device control. Electronics is distinct from electrical science and technology, which deals with the generation, distribution, control and application of electrical power. This distinction started around 1906 with the invention by Lee De Forest of the triode, which made electrical amplification possible with a non-mechanical device. Until 1950 this field was called "radio technology" because its principal application was the design and theory of radio transmitters, receivers and vacuum tubes.
Most electronic devices today use semiconductor components to perform electron control. The study of semiconductor devices and related technology is considered a branch of physics, whereas the design and construction of electronic circuits to solve practical problems come under electronics engineering. This article focuses on engineering aspects of electronics.


Electronic devices and components

An electronic component is any physical entity in an electronic system used to affect the electrons or their associated fields in a desired manner consistent with the intended function of the electronic system. Components are generally intended to be connected together, usually by being soldered to a printed circuit board (PCB), to create an electronic circuit with a particular function (for example an amplifier, radio receiver, or oscillator). Components may be packaged singly or in more complex groups as integrated circuits. Some common electronic components are capacitors, inductors, resistors, diodes, transistors, etc. Components are often categorized as active (e.g. transistors and thyristors) or passive (e.g. resistors and capacitors).

Types of circuits

Circuits and components can be divided into two groups: analog and digital. A particular device may consist of circuitry that has one or the other or a mix of the two types.

Analog circuits
Main article: Analog electronics


Hitachi J100 adjustable frequency drive chassis.
Most analog electronic appliances, such as radio receivers, are constructed from combinations of a few types of basic circuits. Analog circuits use a continuous range of voltage as opposed to discrete levels as in digital circuits.
The number of different analog circuits so far devised is huge, especially because a 'circuit' can be defined as anything from a single component, to systems containing thousands of components.
Analog circuits are sometimes called linear circuits although many non-linear effects are used in analog circuits such as mixers, modulators, etc. Good examples of analog circuits include vacuum tube and transistor amplifiers, operational amplifiers and oscillators.
One rarely finds modern circuits that are entirely analog. These days analog circuitry may use digital or even microprocessor techniques to improve performance. This type of circuit is usually called "mixed signal" rather than analog or digital.
Sometimes it may be difficult to differentiate between analog and digital circuits as they have elements of both linear and non-linear operation. An example is the comparator which takes in a continuous range of voltage but only outputs one of two levels as in a digital circuit. Similarly, an overdriven transistor amplifier can take on the characteristics of a controlled switch having essentially two levels of output.

Digital circuits
Main article: Digital electronics
Digital circuits are electric circuits based on a number of discrete voltage levels. Digital circuits are the most common physical representation of Boolean algebra and are the basis of all digital computers. To most engineers, the terms "digital circuit", "digital system" and "logic" are interchangeable in the context of digital circuits. Most digital circuits use two voltage levels labeled "Low"(0) and "High"(1). Often "Low" will be near zero volts and "High" will be at a higher level depending on the supply voltage in use. Ternary (with three states) logic has been studied, and some prototype computers made.
Computers, electronic clocks, and programmable logic controllers (used to control industrial processes) are constructed of digital circuits. Digital Signal Processors are another example.
Building-blocks:
Logic gates
Adders
Binary Multipliers
Flip-Flops
Counters
Registers
Multiplexers
Schmitt triggers
Highly integrated devices:
Microprocessors
Microcontrollers
Application-specific integrated circuit (ASIC)
Digital signal processor (DSP)
Field-programmable gate array (FPGA)

Heat dissipation and thermal management

Main article: Thermal management of electronic devices and systems
Heat generated by electronic circuitry must be dissipated to prevent immediate failure and improve long term reliability. Techniques for heat dissipation can include heat sinks and fans for air cooling, and other forms of computer cooling such as water cooling. These techniques use convection, conduction, & radiation of heat energy.

Noise

Main article: Electronic noise
Noise is associated with all electronic circuits. Noise is defined as unwanted disturbances superposed on a useful signal that tend to obscure its information content. Noise is not the same as signal distortion caused by a circuit. Noise may be electromagnetically or thermally generated, which can be decreased by lowering the operating temperature of the circuit. Other types of noise, such as shot noise cannot be removed as they are due to limitations in physical properties.

Electronics theory

Main article: Mathematical methods in electronics
Mathematical methods are integral to the study of electronics. To become proficient in electronics it is also necessary to become proficient in the mathematics of circuit analysis.
Circuit analysis is the study of methods of solving generally linear systems for unknown variables such as the voltage at a certain node or the current through a certain branch of a network. A common analytical tool for this is the SPICE circuit simulator.
Also important to electronics is the study and understanding of electromagnetic field theory.

Computer aided design (CAD)

Main article: Electronic design automation
Today's electronics engineers have the ability to design circuits using premanufactured building blocks such as power supplies, semiconductors (such as transistors), and integrated circuits. Electronic design automation software programs include schematic capture programs and printed circuit board design programs. Popular names in the EDA software world are NI Multisim, Cadence (ORCAD), Eagle PCB and Schematic, Mentor (PADS PCB and LOGIC Schematic), Altium (Protel), LabCentre Electronics (Proteus), gEDA, KiCad and many others.

Construction methods

Main article: Electronic packaging
Many different methods of connecting components have been used over the years. For instance, early electronics often used point to point wiring with components attached to wooden breadboards to construct circuits. Cordwood construction and wire wraps were other methods used. Most modern day electronics now use printed circuit boards made of materials such as FR4, or the cheaper (and less hard-wearing) Synthetic Resin Bonded Paper (SRBP, also known as Paxoline/Paxolin (trade marks) and FR2) - characterised by its light yellow-to-brown colour. Health and environmental concerns associated with electronics assembly have gained increased attention in recent years, especially for products destined to the European Union, with its Restriction of Hazardous Substances Directive (RoHS) and Waste Electrical and Electronic Equipment Directive (WEEE), which went into force in July 2006.

See also

Electronics
Audio engineering
Broadcast engineering
Computer engineering
Electronic engineering
Index of electronics articles
Marine electronics
Power electronics
Robotics


(source:wikipedia)

Friday, December 3

Personal computer hardware

Hardware of a modern Personal Computer.
1. Monitor
2. Motherboard
3. CPU
4. RAM
5. Expansion cards
6. Power supply
7. Optical disc drive
8. Hard disk drive
9. Keyboard
10. Mouse
A personal computer is made up of multiple physical components of computer hardware, upon which can be installed a system software called operating system and a multitude of software applications to perform the operator's desired functions.
Though a PC comes in many different forms, a typical personal computer consists of a case or chassis in a tower shape (desktop), containing components such as a motherboard.

Motherboard

Main article: Motherboard
The motherboard is the main component inside the case. It is a large rectangular board with integrated circuitry that connects the rest of the parts of the computer including the CPU, the RAM, the disk drives (CD, DVD, hard disk, or any others) as well as any peripherals connected via the ports or the expansion slots.
Components directly attached to the motherboard include:
The central processing unit (CPU) performs most of the calculations which enable a computer to function, and is sometimes referred to as the "brain" of the computer. It is usually cooled by a heat sink and fan.
The chip set mediates communication between the CPU and the other components of the system, including main memory.
RAM (Random Access Memory) stores all running processes (applications) and the current running OS.
The BIOS includes boot firmware and power management. The Basic Input Output System tasks are handled by operating system drivers.
Internal Buses connect the CPU to various internal components and to expansion cards for graphics and sound.
Current
The north bridge memory controller, for RAM and PCI Express
PCI Express, for expansion cards such as graphics and physics processors, and high-end network interfaces
PCI, for other expansion cards
SATA, for disk drives
Obsolete
ATA (superseded by SATA)
AGP (superseded by PCI Express)
VLB VESA Local Bus (superseded by AGP)
ISA (expansion card slot format obsolete in PCs, but still used in industrial computers)
External Bus Controllers support ports for external peripherals. These ports may be controlled directly by the south bridge I/O controller or based on expansion cards attached to the motherboard through the PCI bus.
USB
FireWire
eSATA
SCSI

Power supply

Main article: Power supply unit (computer)


Inside a custom-built computer: the power supply at the bottom has its own cooling fan.
A power supply unit (PSU) converts alternating current (AC) electric power to low-voltage DC power for the internal components of the computer. Some power supplies have a switch to change between 230 V and 115 V. Other models have automatic sensors that switch input voltage automatically, or are able to accept any voltage between those limits. Power supply units used in computers are nearly always switch mode power supplies (SMPS). The SMPS provides regulated direct current power at the several voltages required by the motherboard and accessories such as disk drives and cooling fans.

Removable media devices

Main article: Computer storage
CD (compact disc) - the most common type of removable media, suitable for music and data.
CD-ROM Drive - a device used for reading data from a CD.
CD Writer - a device used for both reading and writing data to and from a CD.
DVD (digital versatile disc) - a popular type of removable media that is the same dimensions as a CD but stores up to 12 times as much information. It is the most common way of transferring digital video, and is popular for data storage.
DVD-ROM Drive - a device used for reading data from a DVD.
DVD Writer - a device used for both reading and writing data to and from a DVD.
DVD-RAM Drive - a device used for rapid writing and reading of data from a special type of DVD.
Blu-ray Disc - a high-density optical disc format for data and high-definition video. Can store 70 times as much information as a CD.
BD-ROM Drive - a device used for reading data from a Blu-ray disc.
BD Writer - a device used for both reading and writing data to and from a Blu-ray disc.
HD DVD - a discontinued competitor to the Blu-ray format.
Floppy disk - an outdated storage device consisting of a thin disk of a flexible magnetic storage medium. Used today mainly for loading RAID drivers.
Iomega Zip drive - an outdated medium-capacity removable disk storage system, first introduced by Iomega in 1994.
USB flash drive - a flash memory data storage device integrated with a USB interface, typically small, lightweight, removable, and rewritable. Capacities vary, from hundreds of megabytes (in the same ballpark as CDs) to tens of gigabytes (surpassing, at great expense, Blu-ray discs).
Tape drive - a device that reads and writes data on a magnetic tape, used for long term storage and backups.

Secondary storage

Hardware that keeps data inside the computer for later use and remains persistent even when the computer has no power.
Hard disk - for medium-term storage of data.
Solid-state drive - a device similar to hard disk, but containing no moving parts and stores data in a digital format.
RAID array controller - a device to manage several internal or external hard disks and optionally some peripherals in order to achieve performance or reliability improvement in what is called a RAID array.

Sound card

Main article: Sound card
Enables the computer to output sound to audio devices, as well as accept input from a microphone. Most modern computers have sound cards built-in to the motherboard, though it is common for a user to install a separate sound card as an upgrade. Most sound cards, either built-in or added, have surround sound capabilities.

Input and output peripherals

Main article: Peripheral
Input and output devices are typically housed externally to the main computer chassis. The following are either standard or very common to many computer systems.


Wheel Mouse

Input
Main article: Input device
Text input devices
Keyboard - a device to input text and characters by depressing buttons (referred to as keys).
Pointing devices
Mouse - a pointing device that detects two dimensional motion relative to its supporting surface.
Optical Mouse - uses light to determine mouse motion.
Trackball - a pointing device consisting of an exposed protruding ball housed in a socket that detects rotation about two axes.
Touchscreen - senses the user pressing directly on the display
Gaming devices
Joystick - a control device that consists of a handheld stick that pivots around one end, to detect angles in two or three dimensions.
Game pad - a hand held game controller that relies on the digits (especially thumbs) to provide input.
Game controller - a specific type of controller specialized for certain gaming purposes.
Image, Video input devices
Image scanner - a device that provides input by analyzing images, printed text, handwriting, or an object.
Web cam - a video camera used to provide visual input that can be easily transferred over the internet.
Audio input devices
Microphone - an acoustic sensor that provides input by converting sound into electrical signals.

Output
Main article: Output device
Printer - a device that produces a permanent human-readable text of graphic document.
Speakers - typically a pair of devices (2 channels) which convert electrical signals into audio.
Headphones - for a single user hearing the audio.
Monitor - an electronic visual display with textual and graphical information from the computer.
CRT - (Cathode Ray Tube) display
LCD - (Liquid Crystal Display) as of 2010, it is the primary visual display for personal computers.
LED - (light-emitting diode) display


(source:wikipedia)

Thursday, December 2

Network neutrality in the United States

Network neutrality in the United States is a current issue subject to regulatory and judicial contention among network users and access providers. Currently there is general network neutrality in the United States, meaning that telecommunications companies rarely offer different rates to broadband and dial-up Internet consumers based on Internet-based content or service type; however, there are no clear legal restrictions against this. Many broadband providers block common service ports, such as port 25 (SMTP) or port 80 (HTTP), preventing consumers (and botnets) from hosting web and email servers unless they upgrade to a "business" account. In recent years, advocates of network neutrality have sought to restrict such changes.

In 2005 and 2006, corporations supporting both sides of the issue spent large amounts of money lobbying Congress. In 2006, representatives from several major U.S. corporations and the federal government publicly addressed U.S. Internet services in terms of the nature of free market forces, the public interest, the physical and software infrastructure of the Internet, and new high-bandwidth technologies.
Five failed attempts have been made to pass bills in Congress containing some network neutrality provisions. Each of these bills sought to prohibit Internet services providers from using various variable pricing models based upon the user's Quality of Service level. Described as tiered service in the industry and as price discrimination by some economists, typical provisions in the bill state "[Broadband service providers may] only prioritize...based on the type of content, applications, or services and the level of service purchased by the user, without charge for such prioritization". Other provisions common to the net neutrality discussion were included in the proposed legislative works.
The debate in the U.S. in part extends internationally, due to the global nature of many Internet services. (See the main article on net neutrality for details). In practice, net neutrality is also influenced by state level politics, like the $30 billion government project in order to grant influence and neutralize attacks in the web.


History of network neutrality concept
While the term is new, the basic concept originated in the age of the telegram in 1860 or even earlier, where telegrams were routed 'equally' without attempting to discern their contents and adjusting for one application or another. Such networks are "end-to-end neutral".
Services such as telegrams and the phone network (officially, the public switched telephone network or PSTN) are considered common carriers under U.S. law, which means that they are considered akin to public utilities and overseen by the Federal Communications Commission (FCC) in order to ensure fair pricing and access; such networks are expressly forbidden to give preferential treatment.
In the 1990s, some US politicians expressed concern over protecting the growing new electronic resource.
How can government ensure that the nascent Internet will permit everyone to be able to compete with everyone else for the opportunity to provide any service to all willing customers? Next, how can we ensure that this new marketplace reaches the entire nation? And then how can we ensure that it fulfills the enormous promise of education, economic growth and job creation?
—Al Gore, 1994,
The greatest threat to democracy is the increasing concentration of major electronic media in ever fewer hands.
—Rep. David Price (D-NC),.
Cable modem Internet access has always been categorized under U.S. law as an information service, and not a telecommunications service, and thus has not been subject to common carrier regulations, as upheld in National Cable & Telecommunications Association v. Brand X Internet Services. High-speed data links, which make up the Internet's core, are also not regulated by common carrier law. On the other hand, Internet access across the phone network, including DSL, was for a long time categorized as a telecommunications service, and subject to common carrier regulations. However, on August 5, 2005, the FCC reclassified DSL services as information services rather than telecommunications services, and replaced common carrier requirements on them with a set of four less-restrictive net neutrality principles. These principles, however, are not FCC rules, and therefore not enforceable requirements. Actually implementing the principles requires either official FCC rule-making or federal legislation. As the principles do not impose specific regulations, they sparked a debate over whether or not Internet service providers should also be allowed to discriminate between different service providers by offering higher network priority to higher-paying companies and customers, allowing some services to operate faster or more predictably and ultimately become more acceptable to end users
Some broadband providers have proposed to start charging content providers in return for higher levels of service, creating what is known as a tiered Internet. Packets originating from providers who pay the additional fees would in some fashion be given better than "neutral" handling, while those content providers who do not pay the higher fees would get a lesser level of service. Given this ability to accelerate the handling of selected packets, the service providers would perhaps give Quality of Service guarantees to given senders or recipients.
The legal debate about net neutrality regulations echoes previous arguments about the public interest requirements of the telecommunications industry, and whether companies involved in broadcasting are best viewed as community trustees, with obligations to society and consumers, or marketplace participants with obligations only to their shareholders.
Current FCC rules do not clearly prevent telecommunications companies from charging fees to certain content providers in exchange for preferential treatment. On the other hand, neutrality advocates Tim Wu and Lawrence Lessig have argued that the FCC does have regulatory power over the matter, following from the must-carry precedent set in the Supreme Court case Turner I .


Recent developments
In 2005, the FCC adopted a policy statement stating its adherence to four principles of network neutrality. In November 2005 Edward Whitacre, Jr., then Chief Executive Officer of SBC Communications, stated "there's going to have to be some mechanism for these [Internet upstarts] who use these pipes to pay for the portion they're using", and that "The Internet can't be free in that sense, because we and the cable companies have made an investment," sparking a furious debate. SBC spokesman Michael Balmoris said that Whitacre was misinterpreted and his comments only referred to new tiered services.
On June 28, 2006, the Senate Commerce Committee approved the Telecommunications and Opportunities Reform Act, which entails guidelines combating discrimination. The act detailed broadband consumer rights without nondiscriminatory language urged by net neutrality advocates, thought to be a compromise between the ever-battling net neutrality campaigns. It also instituted parameters regarding the actions taken by broadcasters and various media players. However, this bill failed to pass both houses.
In a June 2007 report, the United States Federal Trade Commission (FTC) urged restraint with respect to the new regulations proposed by network neutrality advocates, noting the "broadband industry is a relatively young and evolving one," and given no "significant market failure or demonstrated consumer harm from conduct by broadband providers," such regulations "may well have adverse effects on consumer welfare, despite the good intentions of their proponents." In turn, the FTC conclusions have been questioned in Congress, as in September 2007, when Sen. Byron Dorgan, D-N.D., chairman of the Senate interstate commerce, trade and tourism subcommittee, told FTC Chairwoman Deborah Platt Majoras that he feared new services as groundbreaking as Google could not get started in a system with price discrimination.
In October 2007, Comcast was found to be blocking or severely delaying BitTorrent uploads on their network using a technique which involved creating 'reset' packets (TCP RST) that appeared to come from the other party. On March 27, 2008, Comcast and BitTorrent reached an agreement to work together on network traffic. Comcast will adopt a protocol-neutral stance "as soon as the end of [2008]", and explore ways to "more effectively manage traffic on its network at peak times." Comcast reached a proposed settlement in December 2009 of US$16 million, admitting no wrongdoing and amounting to no more than US$ 16 dollars per share.
On February 25, 2008, Kevin Martin, the Chairman of the Federal Communications Commission, said that he is "ready, willing and able," to prevent broadband Internet service providers from irrationally interfering with their subscribers' Internet access.
In August 2008, the FCC ruled that Comcast broke the law when it throttled the bandwidth available to certain customers for video files in order to make sure that other customers had adequate bandwidth.
January 2008, Time Warner Cable first introduced their intention to move to a "consumption based billing" plan to continue profitable net neutrality. In 2009, information was released that packages would be 10GB, 20GB, 40GB, and 60GB, and featured overage charges of $1 per GB, capped at $75, and Time Warner launched the pricing system in several markets including Rochester, NY, Beaumont, TX and Austin, TX. There was a public outcry. Early April, they announced that they would offer larger packages. Public dissatisfaction did not recede. On April 16, they were forced to abandon the plan altogether.
In May 2010, after reports indicated the FCC would drop their effort to enforce net neutrality, they announced they would continue their fight. It was believed the FCC would not be able to enforce net neutrality after a Federal court's overthrow of the agency's Order against Comcast.

Positions

Organizations that support network neutrality come from widely varied political backgrounds and include groups such as Moveon.org, Free Press, Consumer Federation of America, AARP, American Library Association, Gun Owners of America, Public Knowledge, the Media Access Project, the Christian Coalition, and TechNet. Tim Berners-Lee (the inventor of the World Wide Web) has also spoken out in favor of net neutrality.
The free-market advocacy organizations FreedomWorks Foundation, National Black Chamber of Commerce, the Competitive Enterprise Institute, and the Progress and Freedom Foundation; and high-tech trade groups such as the National Association of Manufacturers, oppose network neutrality.
Journalist Andy Kessler has argued this point, stating that the threat of eminent domain against the telcos, instead of new legislation, is the best approach.
Some U.S. technology trade associations have remained noncommittal on the issue. The U.S. financial sector has similarly remained neutral.
Network neutrality regulations are also opposed by free market advocacy groups, such as Americans for Prosperity and their website No Internet Takeover, as well as minority advocacy groups such as the National Black Chamber of Commerce and LULAC, which receive financial support from telecommunications companies. The Communications Workers of America, the largest union representing installers and maintainers of telecommunications infrastructure, opposes the regulations.
Many network neutrality opponents also oppose telecom common carrier regulations and regulated transparency to customers. Conversely, not all network neutrality proponents emphasize transparency to customers, and most proponents do not phrase network neutrality in terms of existing telecom carrier restrictions even when the desired state is equivalent. In many cases, a return to treating internet service links as telecommunication rather than information carrier services would re-invoke sufficient restrictions on discrimination and refusal to carry to satisfy most definitions of network neutrality. It would also return the carriers to the conditions of limited liability that were in part breached by the 2005 FCC decision that DSL services are information services not telecom services, and thus not subject to common carrier rules.
A number of these opponents have created a website called Hands Off The Internet to explain their arguments against net neutrality. Principal financial support for the website comes from AT&T, and members include technology firms such as Alcatel, 3M and pro-market advocacy group Citizens Against Government Waste.Corporate astroturfing is alleged. For example, one print ad seems to frame the Hands Off the Internet message in pro-consumer terms. "Net neutrality means consumers will be stuck paying more for their Internet access to cover the big online companies' share," the ad claims.

Attempted legislation

Some of the arguments associated with network neutrality regulations came into prominence in mid 2002, offered by the "High Tech Broadband Coalition", a group comprising developers for Amazon.com, Google, and Microsoft. However, the fuller concept of "Network neutrality" was developed mainly by regulators and legal academics, most prominently law professors Tim Wu and Lawrence Lessig and Federal Communications Commission Chairman Michael Powell most often while speaking at the Annual Digital Broadband Migration conference or writing within the pages of the Journal of Telecommunications and High Technology Law,
 both of the University of Colorado School of Law. However, the ideas underlying network neutrality have a long pedigree in telecommunications practice and regulation.
Proposals for network neutrality laws are generally opposed by the cable television and telephone industries, and some network engineers and free-market scholars from the conservative to libertarian, including Christopher Yoo and Adam Thierer. Opponents argue that
 (1) Network neutrality regulations severely limit the Internet's usefulness; 
(2) network neutrality regulations threaten to set a precedent for even more intrusive regulation of the Internet; 
(3) imposing such regulation will chill investment in competitive networks (e.g., wireless broadband) and deny network providers the ability to differentiate their services; and 
(4) that network neutrality regulations confuse the unregulated Internet with the highly regulated telecom lines that it has shared with voice and cable customers for most of its history.
By late 2005, network neutrality regulations were included in several Congressional draft bills, as a part of ongoing proposals to reform the Telecommunications Act of 1996. They would generally require Internet providers to allow consumers access to any application, content, or service. However, important exceptions allow providers to discriminate for security purposes, or to offer specialized services like "broadband video" service. These regulations generally forbid ISPs from offering different service plans to their customers.
In April 2006 a large coalition of public interest, consumer rights and free speech advocacy groups and thousands of bloggers -- such as Free Press, People for the Ethical Treatment of Animals, American Library Association, Christian Coalition of America, Consumers Union, Common Cause and MoveOn.org -- launched the SavetheInternet.com Coalition, a broad-based initiative working to "ensure that Congress passes no telecommunications legislation without meaningful and enforceable network neutrality protections." Within two months of its establishment, over 1,000,000 signatures were delivered to Congress in favor of a network neutrality policies. By the close of 2006, SavetheInternet.com had collected more than 1.5 million signatures effectively stalling legislation in Congress that didn't write Net Neutrality protections into law.
The two proposed versions of "neutrality" legislation to date would prohibit: (1) the "tiering" of broadband through sale of voice- or video-oriented Quality of Service packages; and (2) content- or service-sensitive blocking or censorship on the part of broadband carriers. These bills have been sponsored by Representatives Markey, Sensenbrenner, et al., and Senators Snowe, Dorgan, and Wyden.
The following legislative proposals have been introduced in Congress to address the network neutrality question:
Title Bill number Date introduced Sponsors Provisions Status
109th Congress of the United States (January 2005 – January 2007)
Internet Freedom and Nondiscrimination Act of 2006 S. 2360 March 2, 2006 Senator Ron Wyden (D-Oregon) Prohibits blocking or modification of data in transit, except to filter spam, malware, and illegal content; mandates common-carrier rules for subscriber network operators. Killed by the end of 109th Congress.
Communications Opportunity, Promotion and Enhancement Act of 2006 H.R. 5252 March 30, 2006 Representative Joe Barton (R-Texas and Chairman of the House Commerce Committee) Proposes to create a national franchise for video providers, and additionally addresses net neutrality, e911, and municipal broadband. Passed 321-101 by the full House of Representatives on June 8, 2006- but with the Network Neutrality provisions of the Markey Amendment removed. Bill killed by end of 109th Congress.
Network Neutrality Act of 2006 H.R. 5273 April 3, 2006 Representative Ed Markey (D-Massachusetts) Amends the Communications Opportunity, Promotion, and Enhancement Act of 2006 (COPE) to make its existing neutrality provisions more strict. Defeated 34-22 in committee with Republicans and some Democrats opposing, most Democrats supporting.
Communications, Consumer’s Choice, and Broadband Deployment Act of 2006 S. 2686 May 1, 2006 Senators Ted Stevens (R-Alaska) & Daniel Inouye (D-Hawaii) Aims to amend the Communications Act of 1934 and addresses net neutrality by directing the Federal Communications Commission (FCC) to conduct a study of abusive business practices predicted by the Save the Internet coalition and similar groups. Sent to the full Senate in a 15-7 committee vote and defeated by the Senate Committee on Commerce, Science, & Transportation on June 28, 2006. Killed by the end of 109th Congress.
Internet Freedom and Nondiscrimination Act of 2006[47] H.R. 5417 May 18, 2006 Representatives Jim Sensenbrenner (R-Wisconsin) & John Conyers (D-Michigan) Makes it a violation of the Clayton Antitrust Act for broadband providers to discriminate against any web traffic, refuse to connect to other providers, block or impair specific (legal) content; prohibits the use of admission control to determine network traffic priority. Approved 20-13 by the House Judiciary committee on May 25, 2006. Killed by the end of 109th Congress.
110th Congress of the United States (January 2007 – January 2009)
Internet Freedom Preservation Act (casually known as the Snowe-Dorgan bill) S. 215 (110th Congress) formerly S. 2917 (109th Congress) January 9, 2007 Senators Olympia Snowe (R-Maine) & Byron Dorgan (D-North Dakota), Co-Sponsors: Barack Obama (D-Illinois), Hillary Clinton (D-New York), John Kerry (D-Massachusetts) and other Senators Amends the Communications Act of 1934. Introduces a ban on the blocking/degradation of lawful content, forbids tying Internet access to purchase further services, and a ban on QoS deals between network providers and specific content providers. However, it still allows prioritizing content as long as it origins from the provider's own network, see Sec. 12 (a) (5). Makes the FCC responsible for enforcing complaints and conducting reports on the state of the broadband market. Read twice and referred to the U.S. Senate Committee on Commerce, Science, and Transportation.
Internet Freedom Preservation Act of 2008 H.R.3458 February 12, 2008 Representatives Edward Markey (D-Massachusetts) & Charles Pickering (R-Mississippi) To establish broadband policy and direct the Federal Communications Commission to conduct a proceeding and public broadband summits to assess competition, consumer protection, and consumer choice issues relating to broadband Internet access services, and for other purposes. Introduced to the House Energy and Commerce Committee
(D) = a member of the House or Senate Democratic Caucus; (R) = a member of the House or Senate Republican Conference
Congressman Adam Schiff (D-California), one of the Democrats who voted for the Sensenbrenner-Conyers bill, said: "I think the bill is a blunt instrument, and yet I think it does send a message that it's important to attain jurisdiction for the Justice Department and for antitrust issues."
Although no new bills regulating net neutrality have been introduced in the 111th Congress, Senator Dorgan (D) was reportedly preparing a bill in December 2008. In any case, net neutrality bills are referred to the Senate Committee on Commerce, Science, and Transportation. The Committee Chair, Rockefellar (D) has expressed caution about introducing unnecessary legislation that could tamper with market forces; therefore it is unlikely to pass. In the House, Representative Markey (D) has also discussed reintroducing a net neutrality bill. For 2009, Rep. Markey has reintroduced it.


Opposition to legislation
Given a rapidly-changing technological and market environment, many in the public policy area question the government's ability to make and maintain meaningful regulation that doesn't cause more harm than good.
For example, fair queuing would actually be illegal under several proposals as it requires prioritization of packets based on criteria other than that permitted by the proposed law. Quoting Bram Cohen, the creator of BitTorrent,"I most definitely do not want the Internet to become like television where there's actual censorship... however it is very difficult to actually create network neutrality laws which don't result in an absurdity like making it so that ISPs can't drop spam or stop... attacks." The Internet Freedom Preservation Act of 2009 excludes reasonable network management from regulation, although because it doesn't contain any language or technical specifications to describe such management schemes, it remains unclear the degree of autonomy network operators would have in managing traffic.
The Wall Street Journal believes that: "Government’s...role here, properly understood, is not to tell Comcast how to manage its network. Rather, it is to make sure consumers have alternatives to Comcast if they are unhappy with their Internet service." This is despite the fact that the overwhelming majority of residential consumers subscribe to Internet access service from 1 of only 2 wireline providers: the cable operator or the telephone company, something cannot be changed by the FCC, (who had called the hearing) but could be changed by Congress with the Broadband Conduit Deployment Act, and/or with the promotion of municipal broadband.

Pricing models
For over ten years ISPs have offered unlimited bandwidth at a specified maximum download/upload speed associated with a flat monthly rate for data delivery at the “last mile”. The flat-rate pricing model effectively enabled ISPs to capture market share and quickly grow the user demand for high-speed internet access in the rapid growth environment of the 90’s. Content providers or businesses could also purchase unlimited bandwidth at a flat-rate as it is now an industry standard.
Some ISPs like AT&T and Verizon have argued that providing varying levels of service to websites at various prices could be a way to manage the costs of unused capacity. It will allow selling surplus bandwidth (or "leverage price discrimination to recoup costs of 'consumer surplus'") by moving them to the content providers. However, purchasers of connectivity on the basis of Committed Information Rate or guaranteed bandwidth capacity must expect the capacity they purchase in order to meet their communications requirements.. This would effectively create a 'tiered' internet that will violate some conceptions of net neutrality.
Other ISPs are trying to move to usage-based pricing models. Time Warner Cable, attempted to introduce "consumption based billing" with caps on internet usage much like the model used in the mobile phone industry. They offered packages of 10GB, 20GB, 40GB, and 60GB with $1 overage charges capped at $75 a month. It was met with massive public disapproval and on April 16, 2009, Time Warner was forced to abandon their plan.
The industry is currently looking for a sustainable pricing model that will be accepted by the market.

Legal history
Originally, the Internet was not legally available for commercial use. It became available in the late 1980s.
In the late 1990s and early 2000s, consumers and businesses began to attach new devices to their Internet connections, and use Internet services that were not in existence in the mid-1990s.
One reaction of many broadband operators was to impose various contractual limits on the activities of their subscribers. In the best known examples, Cox Cable disciplined users of virtual private networks (VPNs) and AT&T, as a cable operator, warned customers that using a Wi-Fi service for home-networking constituted "theft of service" and a federal crime. Comcast blocked ports of VPNs, forcing the state of Washington, for example, to contract with telecommunications providers to ensure that its employees had access to unimpeded broadband for telecommuting applications.
These early instances of "broadband discrimination" prompted both academic and government responses. In the early 2000s, legal scholars such as Tim Wu and Lawrence Lessig raised the issue of neutrality in a series of academic papers addressing regulatory frameworks for packet networks. Wu in particular noted that the Internet is structurally biased against voice and video applications.
FCC Chairman Michael Powell in 2004 announced a new set of non-discrimination principles, which he called the principles of "Network Freedom." In a speech at the Silicon Flatirons Symposium in February 2004, Powell stated that consumers must have the following four freedoms:
Freedom to access content.
Freedom to run applications.
Freedom to attach devices.
Freedom to obtain service plan information.
As remarked upon by David Isenberg, Chairman Kevin Martin later modified these four freedoms to read:
Consumers are entitled to access the lawful Internet content of their choice;
Consumers are entitled to run applications and services of their choice, subject to the needs of law enforcement;
Consumers are entitled to connect their choice of legal devices that do not harm the network; and
Consumers are entitled to competition among network providers, application and service providers, and content providers.
On August 5, 2005, the FCC adopted a policy statement stating its adherence to these principles.
Under pressure from the FCC and consumer groups, the broadband operators generally relaxed their most glaring restrictions on network usage.
In early 2005, in the Madison River case, the FCC for the first time showed a willingness to enforce its network neutrality principles by opening an investigation about Madison River Communications, a local telephone carrier that was blocking voice over IP service. While it is often thought that the FCC fined Madison River Communications following the investigation, it did not. The investigation was closed before any formal factual or legal finding. Instead, there was a settlement in which the company agreed to stop discriminating against voice over IP traffic and to make a $15,000 payment to the US Treasury in exchange for the FCC dropping its inquiry. Since the FCC did not formally establish that Madison River Communications violated laws and regulation, the Madison River settlement does not create a formal precedent. Nevertheless, the FCC's action established that it would not sit idly by if other US operators discriminated against voice over IP traffic.
On 1 August 2008 the FCC formally voted 3-to-2 to upholding a complaint against Comcast, the largest cable company in the US, ruling that it had illegally inhibited users of its high-speed Internet service from using file-sharing software. The FCC imposed no fine, but required Comcast to end such blocking in the year 2008. FCC chairman Kevin J. Martin said the order was meant to set a precedent that Internet providers, and indeed all communications companies, could not prevent customers from using their networks the way they see fit unless there is a good reason. In an interview Martin stated that “We are preserving the open character of the Internet” and “We are saying that network operators can’t block people from getting access to any content and any applications.” The case highlighted broader issues of whether new legislation is needed to force Internet providers to maintain network neutrality, i.e. treat all uses of their networks equally. The legal complaint against Comcast related to BitTorrent, software that is commonly used for downloading movies, television shows, music and software on the Internet.
As of April 6, 2010, the FCC’s 2008 cease and desist order against Comcast (due to Comcast’s efforts to slow, and stop BitTorrent transfers) has been denied. The U.S. Court of Appeals ruled that the FCC has no powers to regulate any Internet provider’s network, or the management of its practices: “[the FCC] ’has failed to tie its assertion’ of regulatory authority to an actual law enacted by Congress.”

Regulatory history of broadband
In the United States, broadband services were historically regulated differently according to the technology by which they were carried. While cable Internet has always been classified by the FCC as an information service free of most regulation, DSL was once regulated as a telecommunications service subject to unbundling requirements. As the two types of networks have increasingly provided the same services, it has become difficult to justify different sets of rules, leading to the question of which rules should apply to both.
Towards the end of 2004, the US legal system voided the rules requiring telephone operators to unbundle certain parts of their networks at regulated prices, which had as a consequence the economic collapse of many competitors in access services.
In the U.S., DSL and cable Internet access were formerly regulated by the FCC according to different rules, but in 2005 the FCC re-classified DSL according to the more permissive cable rules  which was the same year that the US Supreme Court in Brand X upheld the classification of cable Internet access as an information service.
An additional regulatory complexity is that cable operators and telephone operators are competing beyond broadband Internet access: cable operators by providing telephone service, and telephone service providers by upgrading their networks with FTTX in order to provide enough bandwidth to support television services.
Advocates of network neutrality wish to re-classify both under the old rules for DSL, which require unbundling and several other restrictions.
Towards the end of 2009, FCC Chair Julius Genachowski announced at the Brookings Institute a proposals that would prevent telecommunications, cable and wireless companies from blocking certain information on the Internet, for example, Skype applications . Some in the industry, such as David Young of Verizon Communications, consider the proposal to be the first rules for the internet imposed by the U.S. government.

State regulations
In the United States, New York has established net neutrality as a telecommunications standard (See 16 NYCRR Part 605).

Legal definition in AT&T/Bell South merger
The AT&T/Bell South merger agreement defines net neutrality as an agreement on the part of the broadband provider: "not to provide or to sell to Internet content, application or service providers ... any service that privileges, degrades or prioritizes any (data) packet transmitted over AT&T/BellSouth’s wireline broadband Internet access service based on its source, ownership or destination." 

Technical complications

Complicating the discussion is the practical reality that the Internet is a highly federated environment composed of thousands of carriers, many millions of content providers and more than a billion end users - consumers and businesses. Prioritizing packets is complicated even if both the content originator and the content consumer use the same carrier. It is much less reliable if the packets have to traverse multiple carrier networks, because the packet getting "premium" service while traversing network A may drop down to non-premium service levels in network B.
Further, the discussion has been very U.S.-centric and very terrestrial-network centered, even though the Internet is inherently global and mobility is the fastest growing source of new demand.
The immediate debate over "neutrality" does not capture the many dimensions of this topic; for example, should voice packets get higher priority than packets carrying email? Or, should emergency services, mission-critical, or life-saving applications, such as tele-medicine, get priority over spam?

Alternatives to cable and DSL
Much of the push for network neutrality rules comes from the lack of competition in broadband services. For that reason, municipal wireless and other wireless service providers are highly relevant to the debate. If successful, such services would provide a third type of broadband access with the potential to change the competitive landscape. For similar reasons, the feasibility of broadband over powerline services is also important to the network neutrality issue. However, as of the Spring of 2006, deployments beyond cable and DSL service have created little new competition.
Cable companies, in response to this threat, have lobbied Congress for a federal preemption to ban states and municipalities from competing and thereby interfering with interstate commerce. However, there is current Supreme Court precedent for an exception to the Commerce Power of Congress for states as states going into business for their citizens.
It has been argued, however, that neither municipal wireless nor other technological solutions such as encryption, onion routing, or time-shifting DVR would be sufficient to render possible discrimination moot.
3GPP cellular networks provide a practical broadband alternative known as EVDO, which, along with WiMax, represents a fourth and fifth pipe. WiMax has been deployed in limited areas, and 3GPP in much wider ones.

(source:wikipedia)