On Mon, Aug 9, 2010 at 3:18 PM, Zaid Ali <z...@zaidali.com> wrote: > The devil is always in the details. The Network management piece is quite > glossed over and gives a different perception in the summary. You can't > perform the proposed network management piece without deep packet inspection > which violates every users privacy.
how is that though? you COULD do something odd like say: "Anything to zaid-ali's netblocks is preferred in queues over things to jolymacfie's netblocks. that wouldn't require any DPI at all, just a traffic classification engine on/near the endpoint, say like on the DocSIS modem, or on the handset itself... many handsets are unix-ish things with some ability to do 'firewall' things, certainly they could mark packets outbound, certainly at peering points a network could classify in simple ways and mark packets properly there as well. nothing required DPI, unless you want to delve into: "That is not ssh on port 22" port 443 is the new port 80! woot! -chris