Dumb pipe

Last updated

A dumb pipe or dumb network, in relation to a mobile network operator (MNO), is a simple network that has high enough bandwidth to transfer bytes between the customer's device and the Internet without the need to prioritize content. This means it can afford to be completely neutral with regard to the services and applications the customer accesses.

Contents

This is in contrast to a smart pipe where the operator affects the customer's accessibility of the Internet by either limiting the available services or applications to its own proprietary portal (like a walled garden) or offer additional capabilities and services beyond simple connectivity. A dumb pipe primarily provides simple bandwidth and network capacity which is greater than the maximum network loads expected thus avoiding the need to discriminate between packet types.

Among the commonly understood operational models for an MNO are dumb pipes, smart pipes, and the walled gardens.

Description

A dumb network is marked by using intelligent devices (e.g. computers) at the periphery that make use of a network that does not interfere with or manage an application's operation / communication. The dumb network concept is the natural outcome of the end-to-end principle. The Internet was originally designed to operate as a dumb network.

In some circles the dumb network is regarded as a natural culmination of technological progress in network technology. With the justification that the dumb network uniquely satisfies the requirements of the end to end principle for application creation, supporters see the dumb network as uniquely qualified for this purpose, as – by design – it is not sensitive to the needs of applications. The dumb network model can, in some ways, allow for flexibility and ease of innovation in the development of applications that is not matched by other models.

Opinions

Criticism

Critics of dumb network architecture posit two arguments in favor of intelligent networks. The first, that certain users and transmission needs of certain applications are more important than others and thus should be granted greater network priority or quality of service. An example is that of real-time video applications that are more time sensitive than say, text applications. Thus video transmissions would receive network priority to prevent picture skips, while text transmissions could be delayed without significantly affecting its application performance. The second is that networks should be able to defend against malware and cyberattacks.

Support

Advocates of dumb networks counter the first argument by pointing out that prioritizing network traffic is very expensive in monetary, technology, and network performance. Dumb networks advocates also consider the real purpose for prioritizing network traffic is to overcome insufficient bandwidth to handle traffic and not a network protocol issue. The security argument is that malware is an end-to-end problem and thus should be dealt with at the endpoints and that attempting to adapt the network to counterattacks is both cumbersome and inefficient.

"In a world of dumb terminals and telephones, networks had to be smart. But in a world of smart terminals, networks have to be dumb."

George Gilder, The Coming of the Fibersphere, Forbes ASAP, December 7, 1992

See also

Related Research Articles

Quality of service (QoS) is the description or measurement of the overall performance of a service, such as a telephony or computer network, or a cloud computing service, particularly the performance seen by the users of the network. To quantitatively measure quality of service, several related aspects of the network service are often considered, such as packet loss, bit rate, throughput, transmission delay, availability, jitter, etc.

<span class="mw-page-title-main">Denial-of-service attack</span> Type of cyber-attack

In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled. The range of attacks varies widely, spanning from inundating a server with millions of requests to slow its performance, overwhelming a server with a substantial amount of invalid data, to submitting requests with an illegitimate IP address.

Internet traffic is the flow of data within the entire Internet, or in certain network links of its constituent networks. Common traffic measurements are total volume, in units of multiples of the byte, or as transmission rates in bytes per certain time units.

Telkom SA SOC Limited is a South African wireline and wireless telecommunications provider, operating in more than 38 countries across the African continent. Telkom is majority state-owned (55.3%) with the South African government owning 40.5% of Telkom, while another 14.8% is owned by another state-owned company - the Public Investment Corporation (PIC), which is closely linked to the South African government.

<span class="mw-page-title-main">Content delivery network</span> Layer in the internet ecosystem addressing bottlenecks

A content delivery network or content distribution network (CDN) is a geographically distributed network of proxy servers and their data centers. The goal is to provide high availability and performance ("speed") by distributing the service spatially relative to end users. CDNs came into existence in the late 1990s as a means for alleviating the performance bottlenecks of the Internet as the Internet was starting to become a mission-critical medium for people and enterprises. Since then, CDNs have grown to serve a large portion of the Internet content today, including web objects, downloadable objects, applications, live streaming media, on-demand streaming media, and social media sites.

An overlay network is a computer network that is layered on top of another network. The concept of overlay networking is distinct from the traditional model of OSI layered networks, and almost always assumes that the underlay network is an IP network of some kind.

<span class="mw-page-title-main">Internet Protocol television</span> Television transmitted over a computer network

Internet Protocol television (IPTV), also called TV over broadband, is the service delivery of television over Internet Protocol (IP) networks. Usually sold and run by a telecom provider, it consists of broadcast live television that is streamed over the Internet (multicast) — in contrast to delivery through traditional terrestrial, satellite, and cable transmission formats — as well as video on demand services for watching or replaying content (unicast).

<span class="mw-page-title-main">Net neutrality</span> Principle that Internet service providers should treat all data equally

Network neutrality, often referred to as net neutrality, is the principle that Internet service providers (ISPs) must treat all Internet communications equally, offering users and online content providers consistent transfer rates regardless of content, website, platform, application, type of equipment, source address, destination address, or method of communication. Net neutrality was advocated for in the 1990s by the presidential administration of Bill Clinton in the United States. Clinton's signing of the Telecommunications Act of 1996, an amendment to the Communications Act of 1934, set a worldwide example for net neutrality laws and the regulation of ISPs.

<span class="mw-page-title-main">Plusnet</span> British internet service provider

Plusnet plc is a British triple play internet service provider (ISP) providing broadband, landline and mobile services. The company was founded in 1997 in Sheffield, England, and became a public limited company (plc) in July 2004 when it was floated on the Alternative Investment Market. On 30 January 2007, Plusnet was acquired by BT Group, but it continues to operate as a separate business. By December 2013, it had over 750,000 customers across the UK.

Bandwidth throttling consists in the limitation of the communication speed, of the ingoing (received) or outgoing (sent) data in a network node or in a network device such as computers and mobile phones.

<span class="mw-page-title-main">Xfinity</span> American cable provider

Comcast Cable Communications, LLC, doing business as Xfinity, is an American telecommunications business segment and division of the Comcast Corporation. It is used to market consumer cable television, internet, telephone, and wireless services provided by the company. The brand was first introduced in 2010; prior to that, these services were marketed primarily under the Comcast name.

Smart pipe, related to a mobile network operator, refers to an operator’s network which leverages existing or unique service abilities, and the operator’s customer relationships, to provide value beyond that of data connectivity only. The use of the term “smart” refers to the operator’s ability to add value for added, and often unique, types of services and content beyond bandwidth and network speed only.

A mobile content delivery network or mobile content distribution network is a network of servers – systems, computers or devices – that cooperate transparently to optimize the delivery of content to end users on any type of wireless or mobile network. Like traditional CDNs, the primary purpose of a Mobile CDN is to serve content to end users with high availability and high performance. In addition, Mobile CDNs can be used to optimize content delivery for the unique characteristics of wireless networks and mobile devices, such as limited network capacity, or lower device resolution. Added intelligence around device detection, content adaptation can help address challenges inherent to mobile networks which have high latency, higher packet loss and huge variation in download capacity.

Network intelligence (NI) is a technology that builds on the concepts and capabilities of deep packet inspection (DPI), packet capture and business intelligence (BI). It examines, in real time, IP data packets that cross communications networks by identifying the protocols used and extracting packet content and metadata for rapid analysis of data relationships and communications patterns. Also, sometimes referred to as Network Acceleration or piracy.

Mobile data offloading is the use of complementary network technologies for delivering data originally targeted for cellular networks. Offloading reduces the amount of data being carried on the cellular bands, freeing bandwidth for other users. It is also used in situations where local cell reception may be poor, allowing the user to connect via wired services with better connectivity.

Application enablement is an approach which brings telecommunications network providers and developers together to combine their network and web abilities in creating and delivering high demand advanced services and new intelligent applications.

Tiered service structures allow users to select from a small set of tiers at progressively increasing price points to receive the product or products best suited to their needs. Such systems are frequently seen in the telecommunications field, specifically when it comes to wireless service, digital and cable television options, and broadband internet access.

Traffic classification is an automated process which categorises computer network traffic according to various parameters into a number of traffic classes. Each resulting traffic class can be treated differently in order to differentiate the service implied for the data generator or consumer.

Net bias is the counter-principle to net neutrality, which indicates differentiation or discrimination of price and the quality of content or applications on the Internet by ISPs. Similar terms include data discrimination, digital redlining, and network management.

IP hard pipe, defined in IETF RFC 7625, is an IP network-based technology that provides bandwidth guarantee and low delay for services.

References