Oh no, you're thinking, yet another cookie pop-up. Well, sorry, it's the law. We measure how many people read us, and ensure you see relevant ads, by storing cookies on your device. If you're cool with that, hit “Accept all Cookies”. For more info and to customise your settings, hit “Customise Settings”.

Review and manage your consent

Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the “Your Consent Options” link on the site's footer.

Manage Cookie Preferences
  • These cookies are strictly necessary so that you can navigate the site as normal and use all features. Without these cookies we cannot provide you with the service that you expect.

  • These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests.

  • These cookies collect information in aggregate form to help us understand how our websites are being used. They allow us to count visits and traffic sources so that we can measure and improve the performance of our sites. If people say no to these cookies, we do not know how many people have visited and we cannot monitor performance.

See also our Cookie policy and Privacy policy.

Bittorrent declares war on VoIP, gamers

The next internet meltdown


Gamers, VoIP and video conference users beware. The leading BitTorrent software authors have declared war on you - and any users wanting to wring high performance out of their networks. A key design change in the P2P application promises to make the headaches faced by ISPs so far look like a party game. So what's happened, and why does it matter?

Upset about Bell Canada’s system for allocating bandwidth fairly among internet users, the developers of the uTorrent P2P application have decided to make the UDP protocol the default transport protocol for file transfers. BitTorrent implementations have long used UDP to exchange tracker information – the addresses of the computers where files could be found – but the new release uses it in preference to TCP for the actual transfer of files. The implications of this change are enormous.

As BitTorrent implementations follow uTorrent’s lead – and they will, since uTorrent is owned by BitTorrent Inc, and is regarded as the canonical implementation – the burden of reducing network load during periods of congestion will shift to the remaining TCP uses, the most important of which are web browsing and video streaming.

By most estimates, P2P accounts for close to half of internet traffic today. When this traffic is immune to congestion control, the remaining half will stumble along at roughly a quarter of the bandwidth it has available today: half the raw bandwidth, used with half efficiency, by 95% of internet users. Oops.

When your internet bandwidth is divided by four, you’re going to notice. Even the downloading fiends who haunt the message boards at Broadband Reports can see this, as several have noted:

Is bypassing TCP congestion control a good thing for the users of the network? Why should one persons [sic] non-interactive file sharing generating a dozen to a hundred streams be more important than my interactive VoIP call or gaming experience?

Using it as a feature, maybe, but enabling this behavior by default is just wrong and will lead to continuing counter, counter measures and more justification for caps.

But this insight isn’t shared by downloaders in general, most of whom have a sense of entitlement where their etiquette gene should be.

What's UDP and why does this matter?

UDP was intended for real-time data transfers such as VoIP that typically move small amounts of data with a low tolerance for delay. By most estimates, UDP traffic amounts to less than two per cent of all internet traffic. Bulk data transfers are supposed to use TCP, in large part because it shoulders the burden of congestion control for the internet’s end-to-end layer. There’s no doubt that P2P file transfers are the epitome of delay-tolerant, bulk data applications.

The internet is only a stable system because application developers are gentlemanly with regard to the amount of traffic they shove onto the network. But it hasn’t always been so.

Next page: The ISPs' dilemma

Similar topics


Other stories you might like

  • Apple dev logs suggest 'nine new M2-powered Macs'
    'Widespread internal testing' of four processor types

    Apple is seemingly testing four next-generation M2 processors on software developed by third-party app makers in at least nine Mac models that are likely to be upcoming laptops and desktops.

    Two years ago, the iGiant debuted its homegrown Arm-compatible M1 processor to power computers and iPads; the shift marked a departure from using x86 Intel silicon for its PCs. Instead of purchasing off-the-shelf processors, Apple – which was already designing its own mobile system-on-chips – wanted a custom design for its macOS products.

    Now it appears the M1's successor, the M2, is edging closer to launch, judging from developer logs leaked to Bloomberg that signal there is "widespread internal testing" of the chip family at Apple.

    Continue reading
  • Twitter preps poison pill to preclude Elon Musk's purchase plan
    Populist provocateur ponders partners to pay for platform prize

    Comment Twitter on Friday said its board of directors had unanimously approved a plan to prevent a hostile takeover, something that became a distinct possibility after billionaire Elon Musk offered $43 billion to buy the social media network.

    The poison pill, or "Rights Plan," the biz said, "will reduce the likelihood that any entity, person or group gains control of Twitter through open market accumulation without paying all shareholders an appropriate control premium or without providing the Board sufficient time to make informed judgments and take actions that are in the best interests of shareholders."

    The "Rights Plan" would require Musk to negotiate directly with the board to increase his share of the company beyond 15 percent. After that every existing shareholder, with the exception of Musk, would be able to buy Twitter stock at a discounted rate.

    Continue reading
  • Feds offer $5m reward for info on North Korean cyber crooks
    Meanwhile: Caltech grad earns five years in prison for heping Kim's coders

    The US government offered a reward up to $5 million for information that helps disrupt North Korea's cryptocurrency theft, cyber-espionage, and other illicit state-backed activities.

    The cash will be awarded "for information that leads to the disruption of financial mechanisms of persons engaged in certain activities that support North Korea, including money laundering, exportation of luxury goods to North Korea, specified cyber-activity and actions that support WMD proliferation," according to the Feds.

    This includes "information on those who seek to undermine cybersecurity, including financial institutions and cryptocurrency exchanges around the world, for the benefit of the Government of North Korea."

    Continue reading

Biting the hand that feeds IT © 1998–2022