Skip to main content

Internet Daemons: Index

Internet Daemons

Index

Index

accelerationism, 165, 166, 180; academic interest in, 165–66; as encouraging flow control, 180–81; vs. escalationism, 178–79; Land’s interpretation of, 166; and optimization, 181–82; and piracy, 166, 181; and The Pirate Bay, 166–71

accountability gaps, 202–3

Active Threat Level Analysis System (ATLAS), 98, 175, 226

adaptive routing, 56, 65

Advanced Research Projects Agency (ARPA), 4, 47. See also ARPANET

advertisements: and affects, 139; “Dancing Alone” (AT&T), 147–50; and internet affects, 136–37, 139–40; “Living with Lag” (ume.net), 156–58; “Not Fair” (Rogers), 150–53; RoadRunner ISP, 153–56; “SpeedBoost” (Rogers), 142–47; and structures of feeling, 139; television, 146; “We Own Faster” (Comcast), 134, 140–42

affects, 137; and bandwidth caps, 149; and buffering, 135–36, 139; of delay, 143–47; of DRM, 145; flow control’s influence on, 138–39, 142, 149–50, 152, 157; and media infrastructures, 136; networked, 137–38; and optimization, 155–56; priming, 138–39; of social acceleration, 150–51; and social temporalities, 147–49, 153; and structures of feeling, 19, 139–40, 149, 190. See also advertisements

algorithms, 12; and bias, 131; and ethics, 202–3; and online content, 222; and regulation, 131–32; as social control, 21

Allot Communications, 99, 109, 164, 210–11

Amoore, Louise, 131–32

Anonymous, 166–67, 172

AppNav Controllers (ANC), 111

Ares Galaxy, 117–18, 124–25

Aria Networks, 130

ARPANET, 43; communication subnet, 76; email, 66; FTP, 66; measuring, 233–34; Network Control Program, 72–73, 78–80; optimization of, 61–67; origins of, 32; packet-switching networks attached to, 81; preventing delays in, 61; proposal for, 51–53; proposed diagrams of, 73, 76; queuing in, 58–59, 61; RFC discussions, 66; RFQ (1968), 57–61; routing in, 60–61, 103–5; simulations of, 62; as social, 66; and TCP/IP, 80, 90; topology of, 63–64; user subnet, 76, 78–79; voice communication, 66. See also Interface Message Processors

artificial companionship, 27, 242n20

artificial intelligence (AI), 22, 130–31, 227

augmented reality (AR), 156–57

Autonomous System Numbers (ASN), 84

AUTOVON, 50–51

bandwidth caps, 123, 149

Baran, Paul, 51, 56–57, 60, 75

Barlow, John Perry, 117

batch computing, 30–31

Bell Canada, 169–70

Bennet, Jane: agency, 202–3; the electrical grid and, 8, 11; ethics, 131–32, 185–86; publics, 195; vibrant materialism, 7–8

“best efforts” routing, 107

biases, 131, 207

BIRD Internet Routing Daemon project, 106, 252n53

BITNET, 87

BitTorrent: and accelerationism, 169; “choking” technique, 169; Distributed Hash Tables (DHTs), 170; functioning of, 119, 124, 168–70; IPREDator VPN, 172–74, 176–80; ISP throttling of, 2–3, 6, 20, 124–25, 169–70; Magnet links, 170; and Packeteer PacketShaper 8500, 176–80; packet inspection of, 100–101; Sync cloud service, 145; trackers, 170. See also Pirate Bay, The

black boxes, 9, 131, 219

Bolt, Beranek, and Newman Inc. (BBN): diagrams for ARPANET, 73, 76; IMPs constructed by, 67, 77; Licklider at, 30; optimization approach, 62; paper on IMPs, 34–35; time-sharing computing, 34–35

boomerang routing, 216–17

bootstrapping, 195, 197

Border Gateway Protocol (BGP), 105–6

bots, 202, 222, 226–27

Braman, Sandra, 66, 204–5

Brunton, Finn, 172, 179, 181

Bucher, Taina, 21, 136

buffering, 58, 135–36, 139. See also advertisements

Bulletin Board Systems (BBS), 87–89

cable modems, 119–20

Cable Modem Termination Systems (CMTS), 117, 119–20, 123–24, 126–28

cable networks, 119–20

caching, 123

Californian ideology, 88

Canadian Broadcasting Corporation (CBC), 5–6, 201

Canadian Gamers Organization (CGO), 200–201, 207

Canadian Radio-Television and Telecommunications Commission (CRTC): complaint process, 205; complaints against Rogers, 198–202; hearings held by, 169, 188; Network Neutrality Rules, 169, 188–89; technological neutrality of, 204

Carey, James, 36

Castells, Manuel, 35, 168, 245n100

censorship, 117, 162

Cerf, Vinton: internet measurement, 234; at IPTO, 65, 67; and Transport Control Protocol, 80, 84; work on gateways, 80–82; work on NCP, 78–80

chapter overviews, 18–20

chronotopism, 140–41, 152, 154–55

Chun, Wendy, 7

Cisco Systems: DPI, 99; IP enforcement, 226; market share, 85, 93; Multi-Protocol Label Switching, 110; policy management, 111; policy maps, 200; routing protocol rankings, 106; Service Control Engine 8000, 93; traffic shaping, IOS, 108–9; Wide Area Application Services, 109, 111

Citizen Lab, 133, 172, 189

Clark, David, 113–14, 253n80

Classless Inter-Domain Routing (CIDR) notation, 84

cloud computing, 5, 145, 156, 239n16

coaxial cable, 117, 119, 126

Comcast: bus metaphor, 129, 140; infrastructure of, 117–19, 126–28; investigations of, 2–3; lawsuits against, 2, 125; and polychronous optimization, 94, 116, 141; P2P monitoring, 117–19, 121, 124; P2P throttling, 1–3, 123–25; use of Sandvine appliances, 2, 121–25, 128; user-centric traffic management, 126–30; “We Own Faster” ad, 134, 140–42; and Xbox gaming, 6, 129

common carrier infrastructure: in diagrams, 73, 75–76; early uses of, 52, 60, 66; and nonsynchronous optimization, 113; and packet inspection concerns, 103

communication: computer-aided, 23–24, 71–72; and control, 39–40; Deleuze on, 171; models of, 85–86; nonsynchronous, 43, 45–46, 53–56, 245n100; organizational, 40; and time and behavior, 36; and transportation, 152

communication infrastructure, computers as, 24, 34, 50. See also Interface Message Processors (IMPs)

communities, online, 71, 86, 88

Compatible Time-Sharing System (CTSS), 3, 34–38, 45, 54, 244n61

“Computer as a Communication Device, The” (Licklider and Taylor), 71–74

content-distribution networks, 217–18

ContentID, 224

content moderators, human, 226

continuous partial attention, 154

control, 15, 39–42. See also flow control

control, networked techniques of: connecting, 215–18; mediating, 220–23; securitization, 223–27; standardizing, 218–20; types of, 215. See also flow control

cooperative obfuscation, 172

Crary, Jonathan, 141, 151, 155–56

Crocker, Stephen, 78–79

Cyber NetFalcon, 98–99

cyborg sciences, 17–18, 23, 25

CYCLADES project, 81, 107

daemonic media policy, 202–8

daemonic media studies: diagrams, 13–14, 212; emphasis on materiality, 12–13; goals of, 227; and media infrastructures, 21–22; methodology, 211–12; and new materialism, 17; of operating systems, 212, 226–27; optimization, 212; overview of, 6–9, 11; questions for, 211; Selfridge as inspiration, 11, 74

daemonizing, 11–12

daemon metaphor, 6

daemons, 3–4, 6–7, 24, 186; and algorithms, 12, 138; as black boxes, 131; in computer science, 21; first instance of, 38; as imperceptible, 192; and Maxwell’s demon, 29, 38, 43; and metastability, 68, 91–92, 112–13; regulation of, 202–8; and web browsing, 96

Dante, 213–14, 227

darknets, 90, 162–63, 165, 171, 179, 181

datafication, 99

Data over Cable Service Interface Specification (DOCSIS), 119–20

Davies, Donald: at ACM symposium (1967), 46, 53; “Digital Communication Network” proposal, 45–46, 53–57; isarithmic network proposal, 64–65, 247n73; at NPL, 45, 53, 81; on queuing, 106–7; and time-sharing, 53

Deep Packet Inspection (DPI), 99; and copyright enforcement, 226; government, 225; hardware for, 98–99, 121; of HTTP traffic, 100; industry value, 93, 99; iPoque, 100; OpenDPI, 100–101; Packeteer PacketShaper 8500, 174–81; privacy implications, 102; probability and, 99, 126; Procera Networks’ use of, 100; and P2P protocol obfuscation, 121; of P2P traffic, 101, 124; Sandvine PTS 8210, 121–26; as security, 99, 101

delay: affects of, 143–47; buffering, 58, 135–36, 139; and control, 154; and flow control, 146–47; and social acceleration, 150–51

Deleuze, Gilles: accelerationism, 166; communication, 171; control, 40; control societies, 15, 41–42, 171, 240n53; diagrams, 13, 74–75; dividuality, 192–93; mediators, 196; metastability concept, 42; modulation, 41; rhizomes, 164; on the war machine, 164, 180

DeNardis, Laura, 96–97

Dewey, John, 20, 189, 194–95, 206–7

diagrams, 13; Comcast’s infrastructure, 118, 127; and daemons, 14, 75–76; Deleuze and Guattari on, 74–75; and flow control, 13; Foucault on, 74; of the internet, 82–85; and internet history, 75; and protocols, 75

Differentiated Services (DiffServ) protocol, 110

digest networks, 87

Digital Rights Management (DRM), 145, 224, 263n32

digital sublime, the, 141

discrimination, 21, 29, 50, 116, 126, 131

distance-vector routing, 103–4

Distributed Denial of Service (DDoS) attacks, 167

distributive agency: and accountability, 202–3; and flow control, 41, 112, 209; novelty of, 57; in “Pandemonium,” 13–14

dividuality, 192–93

domain name seizures, 217

Domain Name System (DNS), 218, 224

dromology, 141

duration concept, 31, 54

Dynamic Adaptive Streaming over HTTP (DASH), 100

Electronic Frontier Foundation (EFF), 88, 117, 125–26

email, 42, 66, 84, 87, 148, 176, 236

eMule, 1, 3, 100, 116, 120

enchantment, 131–32

encryption, 97, 101, 173

End-to-End principle (E2E), 80, 94, 113–15, 125, 253n80

entropy, 3, 24–26, 28, 210

escalationism, 165, 171, 180; vs. accelerationism, 178–79; and confrontation, 166, 181; and flow control, 180–81; IPREDator as, 179; and obfuscation, 99, 120–21, 174, 179, 181; and optimization, 182; and piracy, 179, 181–82; tactics of, 179–80; TOR, 90, 172, 179. See also virtual private networks

ethics, 131, 203–4

exploits, 41, 88–89, 217

Facebook: as algorithmic media, 21, 190; as human content moderation, 226; Instant Articles, 223; Local Awareness, 222; news feed, 131, 221; as platform, 220–21; sentiment analysis, 221; TPB’s use of, 167, 183; use of HTTP, 99

Federal Communications Commission (FCC): Comcast investigation, 2–3, 116, 121, 212; and net neutrality, 17, 141; on right to regulate internet, 3; Verizon investigation, 146

FIDONET, 89

File Transfer Protocol (FTP), 66, 84, 99, 175–76

firewalls, 77–78, 97–98

Five Eyes, 225, 265n78

Fleischer, Rasmus, 164–68, 171, 181

FlowCommand (Saisei Networks), 129–30, 132, 181

flow control, 4–5, 14, 42, 67; as affective influence, 138–39, 142, 149–50, 152, 157; daemons enabling, 4–6, 41–42; and delay, 145; and diagrams, 13; as discrimination, 126; as distributive agency, 41; gateways, 73, 80–82, 105; as inter-network relation, 68–69; Kleinrock on, 16, 59, 247n53; and metastability, 42; and net neutrality, 20–21; and network diversity, 211; and nudge theory, 145–46; and optimalities, 42; Packeteer PacketShaper 8500, 175–79; via packet inspection, 102; in Pandaemonium, 132–33; policy management, 110–12; and queuing, 59; routing as, 60; and social acceleration, 150–51; and social temporalities, 148–49; Software-Defined Networking, 93, 111–12; stakes of, 210–11; and tiers, 210; traffic accelerators, 109; traffic shaping, 108–9, 176–77. See also Deep Packet Inspection; Interface Message Processors; optimization; packet inspection; packet switching; Peer-to-Peer networking; queuing; routing

flows, 35

Ford–Fulkerson algorithm, 12

Foucault, Michel, 13, 39, 74, 223, 225

Frank, Howard, 62–63, 247n65–66

Fuzzballs (gateways), 82, 85

Galloway, Alexander, 13–15, 41, 75, 219

gamer publics, 195–96, 199, 202. See also Rogers Internet connection issues

gateways, 73, 80–82, 105

Gatlinburg ACM symposium (1967), 46, 51, 53, 55, 75

Geist, Michael, 188, 200

Gillespie, Tarleton, 21, 117, 138, 145, 224

Glasnost, 196, 201, 237

Gnutella, 117–18

“good enough” data, 206–7

Google: Accelerated Mobile Page (AMP), 223; as algorithmic media, 21; Brillo, 220; content moderation, 226; and HTTP, 99; and IP enforcement, 224; and ISPs, 217; and machine learning, 219; News, 221; and SDN, 111; search algorithms, 21

Gore, Al, 90–91

Guattari, Félix, 74, 164, 166, 180, 256n28

Haraway, Donna, 15–17, 23, 27

Hayles, Katherine, 23, 25–27, 210

heterarchy, 72, 91, 112–13

High Performance Computing Act, 90–91

hot-potato routing, 56, 60

hubs, 67, 77

human–computer interaction, 30, 143–45. See also man–computer symbiosis

Hypertext Transfer Protocol (HTTP): and DASH, 100; in internet measurement, 237–38, 238; and packet injection, 103; and packet inspection, 96, 99–100; and ports misuse, 99–100, 175; traffic shaping of, 175–76

Inferno operating system, 213–14

Information Processing Techniques Office (IPTO), 46–47, 52; IMP proposal paper (1967), 51–53; and Licklider, 47–49; and modern packet switching, 67; and NAC, 62; networking memo (1963), 48–49; researchers at, 48

information theory, 17, 26–28, 43

infrastructure: centralization of, 217; coaxial cable, 117, 119, 126; Comcast’s, 117–19, 126–28; computers as, 24, 34, 50; and control, 39, 215–16; for early networking, 50, 79; failures in, 185–86; internet fiber, 215; managed vs. unmanaged, 210; and media policy, 204; for mobile devices, 134

intellectual property, 161, 164, 172, 224, 226

Intellectual Property Rights Enforcement Directive (IPRED), 172, 174

Interface Message Processors (IMPs): as abstract components, 76–77; and ARPANET, 46, 57–61, 75; BBN on, 95; daemons replacing, 95; deprecation of, 80; diagram for, 73; functions of, 58–59, 95; as infrastructure, 79; IPTO proposal paper (1967), 51–53; Kleinrock on, 52; in modern network devices, 67, 77; monitoring of, 62; NAC’s reports on, 62–64; name origin, 52; and OLIVERs, 74; as optimistic, 104; as optimizers, 56, 62, 64; origins of, 14, 46, 56–57, 61–67; as protocological, 75; and queuing, 58, 107; routing functions, 58–60, 103–5; trace bits, 233; types of, 75, 77

internet, the: as competing operating systems, 214–15; diagram of, 82–85; fragmentation of, 219–20; as heterarchy, 91; layers of, 83–84; metastability of, 68, 91–92, 112–14; as multiple networks, 36, 85; optimization of, 113, 131–32; origins of, 72, 80, 90–91; as pandaemonium, 7, 94; reliance on daemons, 4–5, 7, 11, 46, 95, 209; and temporalities, 37; and vibrant materialism, 8. See also ARPANET

Internet Assigned Numbers Authority (IANA), 84

Internet Detailed Record Collector servers, 128

Internet Explorer, 135

internet measurement, 233; active, 235; ARPANET, 233–34; CAIDA, 234; Cerf on, 234; crowdsourced, 235–36, 238; frankenflows, 236–37; Glasnost, 196, 201, 237; Measurement Lab, 144, 196, 236; and mediators, 196–97, 205; need for, 187; Ookla’s Speedtest, 235; passive, 235; ping tool, 234; public participation in, 206; and regulation, 206, 236–37; reliance on HTTP, 238; as research, 234–35; SamKnows, 236; traceroutes, 234, 237; WeHe, 237

Internet of Things (IoT), 219, 227

Internet Protocol (IP) addressing, 84, 97

Internet Relay Chat (IRC), 90

internet service providers (ISPs): bandwidth caps, 123, 149; Bell Canada, 169–70; BitTorrent throttling, 2–3, 6, 20, 124–25, 169–70; Verizon, 103, 146, 216; zero-rating programs, 149, 208, 218, 236. See also Comcast; Rogers Communications

iPoque, 100

IPREDator VPN, 172–74, 176–80

isarithmic networks, 64–65

ISC8 Inc., 98–99

Java, 213–14

Jennings, Tom, 89

Juniper Networks, 93, 108, 110–11

Kahn, Robert, 60–61, 67, 80–82, 84

Kelty, Chris, 186, 195

Kleinrock, Leonard: on flow control, 16, 59, 247n53; and Frank, 63; on IMPs, 52; on Licklider, 49; at NMC, 233; queuing theory dissertation, 58–59

Kopimism, 163–64

lag. See delay

Lash, Scott, 15, 213

latency, 187

layering, 82–83

Licklider, J. C. R.: and ARPA, 47; career of, 29–30; “The Computer as a Communication Device,” 71–74, 85–86; at IPTO, 47–49; on man–computer symbiosis, 23, 29–32, 48–49; networking memo, 48–49; as optimist, 32, 48, 71

Lincoln Laboratory, 29–30, 32, 49–51

loading indicators, 155

MacKenzie, Adrian, 68, 138, 213

man–computer symbiosis, 23, 29–32, 48

Marill, Thomas, 49–51, 96

Massachusetts Institute of Technology (MIT): Air Force funding of, 32; computing culture of, 47; “daemon” term origination, 18, 24; MULTICS, 38; Project MAC, 34, 38, 43, 45, 53–54, 59; SAGE, 32; time-sharing experiments, 32, 34–35

materialism, 17

Maxwell’s demon, 24–25; and cyborg sciences, 17–18, 23; influence of, 3, 23, 25–26, 42–43; as information processing, 26; and information theory, 17, 26–28, 43; as inspiration for computers, 28; and metastability, 42; origins of, 3, 227; reality of, 27–28; as symbol of control, 24, 41; and time-sharing computing, 38; Wiener on, 26–29

McCarthy, John, 34, 47

Measurement Lab (M-Lab), 144, 196, 236

media infrastructure, 21, 35

media policy, daemonic, 202–8

mediators, 196; and daemons, 186–87, 196; and internet measurement, 233, 236, 238; and publics, 196–97; and regulation, 206

metastability, 28–29; of the internet, 68, 91–92, 112–14; Maxwell’s demon and, 28, 42; and nonsynchronous optimization, 133; and polychronous optimization, 132

middleboxes, 77–78, 80, 82

Miller, Robert B., 143–44

Mirowski, Philip, 17, 25

Morris worm incident, 78

Motion Picture Association of America (MPAA), 161

Mueller, Milton, 188, 201, 226

Multiplexed Information and Computing Service (MULTICS), 38

Multi-Protocol Label Switching (MPLS), 110

MySpace, 222

Napster, 116–18, 168

National Science Foundation Network (NSFNET), 90–91, 250n67

Neij, Fredrik, 161, 167, 171, 182–83. See also Pirate Bay, The

Netflix, 100, 112, 146, 173, 216–17, 221

net neutrality: and bandwidth throttling, 2–3; Canada’s Network Neutrality Rules, 169, 188–89; difficulties of enforcing, 189; FCC, 17, 141; FlowCommand, 129–30, 132, 182; and flow control, 20–21, 68, 102; and internet infrastructure industry, 133; North American regulations, 131, 142; and polychronous optimization, 116; and user-centric management, 129

Network Analysis Corporation (NAC), 62–64

Network Control Program (NCP), 72–73, 78–80

Networking Working Group, 51

Network Measurement Center (NMC), 233–34

networks, 35, 86; relations among, 216; Scantlebury’s types of, 56; store-and-forward, 52, 54, 58; as synchronizations, 35–36; uneven time within, 36–37. See also ARPANET; internet, the

Nissenbaum, Helen, 172, 179, 181

nonsynchronous communication, 43, 45–46, 53–56, 245n100

nudge theory, 145

obfuscation, 99, 120–21, 172, 174, 179, 181

OLIVERs, 74–75

Onion Router, The. See TOR

OpenMedia, 200, 207

Open Shortest Path First (OSPF) protocol, 105–6

operating systems (OS): Brillo, 220; connectivity of, 215; in daemonic media studies, 212, 227; and daemons, 212–14, 226; Inferno, 213–14; networked, 20, 214, 218, 226. See also control, networked techniques of

optimalities, 42, 64, 75, 113, 130, 133

optimization, 15, 62, 211; accelerationist, 181–82; of ARPANET, 61–67; automated, 130–32; and capital, 131; in daemonic media studies, 212; debates on, 61–62, 64–65, 91; decentralization of, 56–57; escalationist, 182; of the internet, 113, 131–32; limits of, 64; minimum transmission conditions, 112–13; nonsynchronous, 94, 113–15, 132–33, 210; as optimism, 15, 131–32; topological, 63–64. See also optimization, daemonic

optimization, daemonic: and ARPANET, 64; cultural impact of, 5–6; and flow control, 5, 67–68, 112–13; as optimism, 16; and sociopolitical concerns, 16–17. See also flow control; optimization, polychronous; packet switching

optimization, polychronous, 94, 115; and affect, 155–56; and bandwidth, 115–16; and entropy, 210; goal of, 209; managed infrastructure as, 210; and net neutrality, 116, 202; as policy issue, 134; and predictability, 210; Rogers’s SpeedBoost, 152; and temporalities, 133; trend towards, 133; and user affect, 19; user-centric traffic management, 126–30. See also Comcast

ouroboros, 136, 139, 154, 185

Packeteer PacketShaper 8500, 174–81

packet injection, 102–3, 125

packet inspection, 96; ATLAS initiative, 98; and encryption, 97, 101; firewalls, 97–98; and flow control, 102; flow inspection, 101; and logging, 98–99; and machine learning, 101–2; measuring, 236–37; modern, 97, 102; and net neutrality, 102; and policies, 110; privacy implications of, 102–3; and protocols, 96–97; and traffic shaping, 108–9; and VPNs, 173. See also Deep Packet Inspection

packets, 96

packet switching, 4; CYCLADES project, 81, 107; in Davies’s proposal, 45, 54–56; diagrams of, 73; gateways, 73, 80–82, 105; infrastructures for, 81; IPTO’s contribution to, 46; and isarithmic networks, 64–65; modern, 67, 77; NCP, 72–73, 78–80; as optimization, 16; origins of, 4; “Pandemonium” as early example, 14. See also ARPANET; Interface Message Processors; routing

packet switching codification documents: ARPANET RFQ (1968), 57–61; IMP proposal paper (1967), 51–53; Licklider’s memo (1963), 48–49; Marill and Roberts’s report (1966), 49–51

“Pandemonium” program (Selfridge), 8–14, 240n34

Papacharissi, Zizi, 139, 190

Parks, Lisa, 35, 136

Pasquale, Frank, 130–31

peering, 216–17

Peer-to-Peer (P2P) networking, 116; applications closed, 168; Ares Galaxy, 117–18, 124–25; bandwidth concerns, 122–23; BBS as inspiration for, 88–89; and cable networks, 120; and censorship, 117; as congestion, 122, 124, 169–70; eMule, 1, 3, 100, 116, 120; and E2E principle, 116–17, 120, 125–26; Gnutella, 117–18; ISP management of, 121–24, 133; ISP throttling of, 1–3, 6, 92, 94, 125, 169–70, 188; Napster, 116–18, 168; and piracy, 92; port spoofing, 99, 175; protocol obfuscation, 120–21, 175; and Sandvine PTS 8210s, 121–25. See also BitTorrent; Comcast; Pirate Bay, The

phreakers, 89

ping tool, 234

piracy: and accelerationism, 166, 181; centrifugal politics of, 163–64, 170; culture of, 88–89; and decentralization, 163–64; and escalationism, 179, 181–82; and formats, 219; mass, 116, 168; and Napster, 116; and nudge theory, 145–46; and political tactics, 165; and property regimes, 164; via P2P file sharing, 92. See also Pirate Bay, The

Piratbyrån (“Piracy Bureau”), 163; and accelerationism, 165–66, 168; and escalationism, 165–66, 181; Rasmus Fleischer on, 164–68, 171, 181; and the intellectual property regime, 164; Kopimism, 163–64; and The Pirate Bay launch, 163, 165, 167–68; and resisting daemons, 164

Pirate Bay, The (TPB), 161; as accelerating piracy, 168; and accelerationism, 166–71; administrator trial and arrest, 161–62, 182–83; British ban on, 166–67, 217; copyright politics of, 161–62; as eluding flow control, 162–63; and escalationism, 172–74, 179; hosting of, 170–71; IPREDator VPN, 172–74, 176–80; launch of, 163, 165, 167–68, 183; police raid on, 161–62, 182; policies of, 162; as political act, 167; relaunch of, 162; resilience of, 168, 170–71; size of, 170

pirate political parties, 165, 174, 182–83

Plan 9, 213, 220

platforms, 213, 220–24

Policy and Charging Control (PCC), 134

policy management, 110–12

Policy Traffic Switch (PTS) 8210, 121–25

political bots, 222

Pouzin, Louis, 67, 81

power: algorithmic, 21; constituent vs. constituted, 39, 41; and control, 39; control societies, 15, 41–42, 171, 240n53; diagrams describing, 13, 18, 74; and materiality, 11; “netscapes” of, 115, 130; and time, 68, 152. See also control, networked techniques of; flow control

priming (affect theory), 138–39

privacy, 90, 121–22, 172, 179. See also escalationism; Virtual Private Networks

Procera Networks, 93, 100, 134

progress bars, 155

Project MAC, 34, 38, 43, 45, 53–54, 59

protocols, 51, 96; administration of, 218; consequences of, 219; Galloway’s theory of, 75; Open Shortest Path First, 105–6; as political, 96–97; and routing, 103–4; VPN, 173

proxy servers, 167, 172, 217

publics, 186; and daemons, 186, 192–93, 195; forming of, 191, 194–95; gamer, 195–96, 199, 202; and information, 194; and institutions, 205; as intelligences, 194; and the internet, 186; and mediators, 196–97; and nonhumans, 195; problematic, 206; recursive, 195; reflexive apparatuses in, 191–92, 197; research by, 194–95; scope issues, 207; and self-awareness, 207–8; and systematic care, 207–8. See also Rogers Internet connection issues

queuing, 106; “class-based weighted fair,” 108–9; IMPs, 107; “leaky bucket” algorithm, 107–8; measuring, 237; and prioritization, 109–10; round-robin technique, 106–7; theories of, 58–59; in time-sharing computing, 59, 106–7; “token bucket” algorithm, 108; traffic shaping, 108–9

real-time computing, early, 32–33, 43, 243n51. See also Semi-Automatic Ground Environment

Reddit, 90, 206

Reed, David, 113–14, 253n80

reflexive apparatuses, 191–92, 197

reification, 11–12

“reply girls,” 222

reset packets, 125–26

resisting. See accelerationism; escalationism

Resource reSerVation Protocol (RSVP), 110

rhizomes, 164

Roberts, Lawrence, 49–51, 53, 57

Rogers Internet: CRTC findings against, 201–2; and DPI, 169–70; “Not Fair” ad, 150–53; packet injection practices, 103; and P2P, 169–70, 187–88, 198–99, 201; Rogers Alerts, 222; “SpeedBoost” ad, 142–47; and traffic management devices, 198–99; upstream traffic management, 187–88, 201

Rogers Internet connection issues, 185, 187; accountability for, 203; awareness-raising tactics, 190–91, 194; CBC reporting on, 201; and CGO, 200–201; CRTC involvement, 198–202; difficulties addressing, 186, 193–94; forum discussions, 187–89, 193; gamer research on, 187–90, 193, 196, 198; gamers as a public, 191–93; lack of information, 190; and mediators, 196; Teresa Murphy and, 197–200, 204–5, 207; P2P theory, 198–99; Shifthead’s posts, 187, 194, 196; traffic management theory, 198–200

routers, 77, 85

routing, 103, 106; adaptive, 56, 65; “best efforts” method, 107; BIRD, 106, 252n53; boomerang, 216–17; daemons’ role in, 60–61; distance-vector, 103–4; and domains, 103; hot-potato, 56, 60; by IMPs, 58–60, 103–4; link-state, 104–5; measuring, 237; policy-based, 111; protocols for, 103–6; in telephone engineering, 59–60

Saisei Networks, 129–30, 132

Saltzer, Jerome, 113–14, 253n80

Sandvig, Christian, 17, 102

Sandvine: Congestion Management FairShare servers, 128; on DPI, 99; FairShare policy management, 122, 125; internet measurement, 235; Policy Traffic Switch 8210, 121–25; Policy Traffic Switch Daemon, 121–22, 125–26, 128; on P2P management, 2, 122–23, 254n15

Scantlebury, Roger, 53, 55–57

security: ATLAS program, 98, 175, 226; AUTOVON, 50–51; control via, 223–27; via DPI, 225–26; encryption, 97, 101, 173; firewalls, 77–78, 97–98; Foucault on, 223; and government surveillance, 225, 266n86; and intellectual property, 224; mechanisms of, 224–25

Selfridge, Oliver, 8–14, 74, 240n34

Semi-Automatic Ground Environment (SAGE), 32, 35–36, 68

Semi-Automated Business Research Environment (SABRE), 33, 35

Shannon, Claude, 25–28, 210

Sharma, Sarah, 37, 68, 152

shortest-path-first algorithms, 105

sigils, 136

Simple Network Management Protocol (SNMP), 119–20

Singapore, 225

Skype, 101, 109, 116, 237

Snowden, Edward, 97, 225, 266n86

social acceleration, 150–51, 153–54

social imaginaries, 86, 220

social media, 36–37, 90, 200, 221–22. See also Facebook

societies of control, 15, 41–42, 171, 240n53

Software-Defined Networking (SDN), 93, 111–12

source code, 7, 100–101, 234

speed, 140–41, 147, 154. See also accelerationism

standards, 218–19, 263n32. See also protocols

Stanford Blue Box, 85

Starosielski, Nicole, 35, 136

store-and-forward networks, 52, 54, 58

“structures of feeling” concept, 19, 139–40, 149, 190

Sunde, Peter, 161–62, 167, 173, 182–83. See also Pirate Bay, The

Supervisor program (CTSS), 34, 37–38, 45, 244n61

surveillance, government, 225

switches, 67, 77

synchronization, 35–36

System Development Corporation, 50

System Response Time (SRT), 143–44

Taylor, Robert, 67, 71–74, 85–86

technological fixes, 92

Telecomix, 172

telegraphy, 36–37, 41, 52, 152

telephony, 50–51, 59–60, 88–89

temporalities, 37, 147; and communication, 113; comparative value of, 35, 60–61, 67–68; of networks, 35, 60–61, 67, 86, 90–91; and polychronous optimization, 115, 133; and publics, 192; social, 147–49, 153; and time, 37. See also time

Theory of Heat (Maxwell). See Maxwell’s demon

thermodynamics, 3, 7, 25–26, 38. See also Maxwell’s demon

Third Generation Partnership Project (3GPP), 134

time: and air travel, 152; and algorithmic trading, 140; annihilation of, 141; bio-political economy of, 152; and Chicago Commodity Exchange, 36; and the internet, 37; and man–computer symbiosis, 30–31; and networks, 35–37; and New York Stock Exchange, 37; and nonsynchronous communication, 245n100; and speed, 154. See also temporalities

time-sharing computing, 33–35, 43, 47, 54, 59. See also Compatible Time-Sharing System; Project MAC

“token bucket” algorithm, 108

Topolski, Robb, 2, 4

TOR (The Onion Router), 90, 172, 179

traceability problem, the, 203–4

traceroutes, 191, 196, 233–34, 237

traffic accelerators, 109

traffic management, Canadian, 201

traffic shaping, 108–9, 176–77

Transmission Control Protocol and Internet Protocol (TCP/IP), 66, 80, 84, 90, 97

Transport Control Program, 80, 84

tunnels, 165, 171–73, 175, 181, 193

Turing, Alan, 26–27, 53

Turing test, 27, 222

Twitter, 200, 221–22

USENET, 87, 90

User Datagram Protocol (UDP), 84, 98

Verizon, 103, 146, 216

vibrant materialism, 7–8

Virilio, Paul, 141, 147, 154

virtual communities, 88

virtual private networks (VPNs), 172–74, 176–80

waiting, 153–56

Warg, Gottfrid Svartholm, 161, 167, 182–83. See also Pirate Bay, The

war machine, the, 164, 180

Warner, Michael, 191–92

web browsers, 96, 101, 135, 155, 220

Whole Earth ’Lectronic Link (WELL), 88

Wiener, Norbert: on demons, 3; on duration and machines, 31; on entropy, 3, 28, 210; and information theory, 26; on Maxwell’s demon, 25–29, 43; on metastability, 28–29; pessimism toward computing, 48

Wikipedia, 219, 222

Wilkinson, Roger I, 60

Williams, Raymond, 39, 139

Winseck, Dwayne, 115, 130–31

wirelessness, 138

women, marginalization of, 29

wonkish populism, 207

World of Warcraft. See Rogers Internet connection issues

YouTube, 221–22, 224

zero-rating programs, 149, 208, 218, 236

Zittrain, Jonathan, 40, 114–15

Next Chapter
Internet Daemons
PreviousNext
Copyright 2018 by the Regents of the University of Minnesota
Powered by Manifold Scholarship. Learn more at manifoldapp.org