Terry Zink's Cyber Security Blog

Discussing Internet security in (mostly) plain English

Browse by Tags

Tagged Content List
  • Blog Post: How traffic shaping works, part 2

    Continuing on from my previous post , we can see that in a packet switching network, data goes from point A to point B with no regards to the type of data being carried.  Various algorithms compute the best path with no regards for the type of traffic being transmitted.  If a protocol is SMTP...
  • Blog Post: How traffic shaping works, part 1

    With all of the brou-ha-ha of the past couple of years surrounding Net Neutrality, and especially with a federal court ruling that the FCC had no grounds to enforce it, I thought that I would get into a bit about how traffic shaping works, which is at the heart of Net Neutrality. Imagine that you have...
  • Blog Post: Federal Appeals Court rejects FCC’s bid to enforce Net Neutrality

    Yesterday, a federal appeals court ruled that Internet traffic regulators like the FCC had limited power over web traffic under current law.  The court decision was a setback to efforts by the Federal Communications Commission to require companies to give Web users equal access to all content, even...
Page 1 of 1 (3 items)