Directory Image
This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.

Net Neutrality Paper

Author: Janet Peter
by Janet Peter
Posted: Nov 14, 2018
social media Content-Based Broadband Throttling and the Experiences with Piracy Protection

Broadband throttling involves using wireless network under restrictions by a specifying period and amount of data to use. After using a specific amount of data allocated by Internet Service Provider (ISP), the speed of downloading and uploading reduces. The speed of downloading and uploading may shift from 4g to 3G or relatively lower speed (Prepaid wireless Guide.com, 2013). However, the plan is allocated to individuals meant to use abuse internet. Increased pirating activities using a hand held devices like smartphones, tablets, and iPhone led to the implementation of broadband throttling. Initially, wireless users were supplied with unlimited data plan. Users were consuming a lot of data while downloading Music, video clips, games and graphic. Downloaded materials composed of pirated items that were illegally obtained from various sites. Wireless network users misused freedom of accessing the internet through using too many data while downloading and sharing pirated music, video, and graphics. Users turned into network abusers causing ISP to incur a loss in providing a large amount of bandwidth to sustain the users of the network.

The appetite of enjoying real-time video streaming, music, photos, and files sharing contributed to pirating practices among the wireless network users. Unlimited data supply from ISP suffered caused increased abuse of patent rights, rights to property, and breach of ownership rights. As a result of the continued supply of unlimited data, text, and voice to users reduced long-term profitability. The rise of applications like Netflix and streaming TV, which was introduced into Smartphones caused rampantly increased consumption of bandwidth by distributing pirated videos, music, files, and clips (Prepaid wireless Guide.com, 2013). Such practices discouraged creativity as well as causing decreased profits to ISP. Wireless services providers were forced to implement network throttling. Implementation of throttling strategies led to reduced downloading of pirated devices. Pirating reduced in high rate due to the implementation of controlled data use and time.

Experience with Broadband Speeds and Piracy Protection

Freedom of using and accessing network has led to increased mass of rights of ownership. Rules and regulations concerning intellectual property have been breached due to misuse of easy accessibility and internet privacy. The increased constant supply of broadband by ISP has led to increasing in many individuals surfing across the internet. Individuals using the Internet currently access different techniques in sharing, downloading, and uploading contents in the network. Contents shared include personal work of creativity, thus causing pirating. Among factors that have contributed to pirating include increased the supply of broadband (Reavis, et al…, 1991). Many sites have promoted the issue of increased pirating activity a situation that has led to decreased in consumer bandwidth.

Social media platforms like Twitter, Facebook, and Instagram have contributed to the distribution of pirated music, Video, and files. Increased pirating across social media platforms has been caused by ISP providers trying to increase and maintain a high number of customers by providing feed data on social platforms. Free social media access has led to increased downloading, uploading and sharing of pirated music, files, videos, and photos. The resultant of increased activities is high consumption of consumer bandwidth leading to reduced data on the consumer side. Reduced bandwidth on the consumer side is due to high traffic from social media platforms where much data and information is pirated, shared, and distributed illegally (Prepaid wireless Guide.com, 2013). Much pirated data affect creativity market by discouraging artists, programmers, developers, and designers. Through social media platforms data, network bottlenecks are experienced by other legitimate users as a result of users of social media distributing and sharing customized personal data composed of large data files.

Sites like YouTube, iTunes, Netflix and other related websites that are involved in streaming video, music, TV programs, software and games. Such platforms contribute to digital pirating by providing easy ways of downloading and distributing software, creativity work and customized graphics like photos, video and huge document files (Sundararajan, 2004).

Recommendation

Problems associated with pirating should be reduced by ensuring creativity is highly promoted among inventors, artists, actors, and developers. ISP should be responsible enough to control and manage data and information sharing across the network. The amount of data consumed should be regulated to ensure minimal data and information consumption. Data spent on social platforms should be limited to the amount of data that a user should use. Web sites involved in providing real-time streaming of data and information should ensure that user pays for every item downloaded from their sites. Sites are failing to commercialize their services should be closed. Society should be educated on legal issues, ethical practices, and good practices to ensure they don’t participate in spreading piracy. Technology policies, rules and procedures awareness should be created by computer and internet users. Authority should get concerned about ISP, who have no or limited care on other commercial users of bandwidth. Internet application should have best operation parameters to ensure overall utilization on best and productive activities.

Reference

Prepaid wireless Guide.com (2013). Free Talk Text & Data.

wireless-guide.com/broadband-throttling.html

Reavis, C. K., & Rumelt, R. P. (1991). Software Piracy: An Analysis of Protection

Strategies. Management Science, 37, 2, 125-139

Sundararajan, A. (2004). Managing Digital Piracy: Pricing and Protection. Information Systems

Research, 15, 3, 287-308

Sherry Roberts is the author of this paper. A senior editor at Melda Research in custom college essay services if you need a similar paper you can place your order for a custom research paper from legitimate paper writing services.

About the Author

"Janet Peter is the Managing Director of a globally competitive essay writing company.

Rate this Article
Leave a Comment
Author Thumbnail
I Agree:
Comment 
Pictures
Author: Janet Peter
Premium Member

Janet Peter

Member since: Dec 11, 2017
Published articles: 349

Related Articles