Index
accelerationism, 165, 166, 180; academic interest in, 165–66; as encouraging flow control, 180–81; vs. escalationism, 178–79; Land’s interpretation of, 166; and optimization, 181–82; and piracy, 166, 181; and The Pirate Bay, 166–71
accountability gaps, 202–3
Active Threat Level Analysis System (ATLAS), 98, 175, 226
Advanced Research Projects Agency (ARPA), 4, 47. See also ARPANET
advertisements: and affects, 139; “Dancing Alone” (AT&T), 147–50; and internet affects, 136–37, 139–40; “Living with Lag” (ume.net), 156–58; “Not Fair” (Rogers), 150–53; RoadRunner ISP, 153–56; “SpeedBoost” (Rogers), 142–47; and structures of feeling, 139; television, 146; “We Own Faster” (Comcast), 134, 140–42
affects, 137; and bandwidth caps, 149; and buffering, 135–36, 139; of delay, 143–47; of DRM, 145; flow control’s influence on, 138–39, 142, 149–50, 152, 157; and media infrastructures, 136; networked, 137–38; and optimization, 155–56; priming, 138–39; of social acceleration, 150–51; and social temporalities, 147–49, 153; and structures of feeling, 19, 139–40, 149, 190. See also advertisements
algorithms, 12; and bias, 131; and ethics, 202–3; and online content, 222; and regulation, 131–32; as social control, 21
Allot Communications, 99, 109, 164, 210–11
Amoore, Louise, 131–32
AppNav Controllers (ANC), 111
Aria Networks, 130
ARPANET, 43; communication subnet, 76; email, 66; FTP, 66; measuring, 233–34; Network Control Program, 72–73, 78–80; optimization of, 61–67; origins of, 32; packet-switching networks attached to, 81; preventing delays in, 61; proposal for, 51–53; proposed diagrams of, 73, 76; queuing in, 58–59, 61; RFC discussions, 66; RFQ (1968), 57–61; routing in, 60–61, 103–5; simulations of, 62; as social, 66; and TCP/IP, 80, 90; topology of, 63–64; user subnet, 76, 78–79; voice communication, 66. See also Interface Message Processors
artificial companionship, 27, 242n20
artificial intelligence (AI), 22, 130–31, 227
augmented reality (AR), 156–57
Autonomous System Numbers (ASN), 84
AUTOVON, 50–51
Baran, Paul, 51, 56–57, 60, 75
Barlow, John Perry, 117
batch computing, 30–31
Bell Canada, 169–70
Bennet, Jane: agency, 202–3; the electrical grid and, 8, 11; ethics, 131–32, 185–86; publics, 195; vibrant materialism, 7–8
“best efforts” routing, 107
BIRD Internet Routing Daemon project, 106, 252n53
BITNET, 87
BitTorrent: and accelerationism, 169; “choking” technique, 169; Distributed Hash Tables (DHTs), 170; functioning of, 119, 124, 168–70; IPREDator VPN, 172–74, 176–80; ISP throttling of, 2–3, 6, 20, 124–25, 169–70; Magnet links, 170; and Packeteer PacketShaper 8500, 176–80; packet inspection of, 100–101; Sync cloud service, 145; trackers, 170. See also Pirate Bay, The
Bolt, Beranek, and Newman Inc. (BBN): diagrams for ARPANET, 73, 76; IMPs constructed by, 67, 77; Licklider at, 30; optimization approach, 62; paper on IMPs, 34–35; time-sharing computing, 34–35
boomerang routing, 216–17
Border Gateway Protocol (BGP), 105–6
buffering, 58, 135–36, 139. See also advertisements
Bulletin Board Systems (BBS), 87–89
cable modems, 119–20
Cable Modem Termination Systems (CMTS), 117, 119–20, 123–24, 126–28
cable networks, 119–20
caching, 123
Californian ideology, 88
Canadian Broadcasting Corporation (CBC), 5–6, 201
Canadian Gamers Organization (CGO), 200–201, 207
Canadian Radio-Television and Telecommunications Commission (CRTC): complaint process, 205; complaints against Rogers, 198–202; hearings held by, 169, 188; Network Neutrality Rules, 169, 188–89; technological neutrality of, 204
Carey, James, 36
Castells, Manuel, 35, 168, 245n100
Cerf, Vinton: internet measurement, 234; at IPTO, 65, 67; and Transport Control Protocol, 80, 84; work on gateways, 80–82; work on NCP, 78–80
chapter overviews, 18–20
chronotopism, 140–41, 152, 154–55
Chun, Wendy, 7
Cisco Systems: DPI, 99; IP enforcement, 226; market share, 85, 93; Multi-Protocol Label Switching, 110; policy management, 111; policy maps, 200; routing protocol rankings, 106; Service Control Engine 8000, 93; traffic shaping, IOS, 108–9; Wide Area Application Services, 109, 111
Classless Inter-Domain Routing (CIDR) notation, 84
cloud computing, 5, 145, 156, 239n16
Comcast: bus metaphor, 129, 140; infrastructure of, 117–19, 126–28; investigations of, 2–3; lawsuits against, 2, 125; and polychronous optimization, 94, 116, 141; P2P monitoring, 117–19, 121, 124; P2P throttling, 1–3, 123–25; use of Sandvine appliances, 2, 121–25, 128; user-centric traffic management, 126–30; “We Own Faster” ad, 134, 140–42; and Xbox gaming, 6, 129
common carrier infrastructure: in diagrams, 73, 75–76; early uses of, 52, 60, 66; and nonsynchronous optimization, 113; and packet inspection concerns, 103
communication: computer-aided, 23–24, 71–72; and control, 39–40; Deleuze on, 171; models of, 85–86; nonsynchronous, 43, 45–46, 53–56, 245n100; organizational, 40; and time and behavior, 36; and transportation, 152
communication infrastructure, computers as, 24, 34, 50. See also Interface Message Processors (IMPs)
communities, online, 71, 86, 88
Compatible Time-Sharing System (CTSS), 3, 34–38, 45, 54, 244n61
“Computer as a Communication Device, The” (Licklider and Taylor), 71–74
content-distribution networks, 217–18
ContentID, 224
content moderators, human, 226
continuous partial attention, 154
control, 15, 39–42. See also flow control
control, networked techniques of: connecting, 215–18; mediating, 220–23; securitization, 223–27; standardizing, 218–20; types of, 215. See also flow control
cooperative obfuscation, 172
Crary, Jonathan, 141, 151, 155–56
Crocker, Stephen, 78–79
Cyber NetFalcon, 98–99
cyborg sciences, 17–18, 23, 25
daemonic media policy, 202–8
daemonic media studies: diagrams, 13–14, 212; emphasis on materiality, 12–13; goals of, 227; and media infrastructures, 21–22; methodology, 211–12; and new materialism, 17; of operating systems, 212, 226–27; optimization, 212; overview of, 6–9, 11; questions for, 211; Selfridge as inspiration, 11, 74
daemonizing, 11–12
daemon metaphor, 6
daemons, 3–4, 6–7, 24, 186; and algorithms, 12, 138; as black boxes, 131; in computer science, 21; first instance of, 38; as imperceptible, 192; and Maxwell’s demon, 29, 38, 43; and metastability, 68, 91–92, 112–13; regulation of, 202–8; and web browsing, 96
darknets, 90, 162–63, 165, 171, 179, 181
datafication, 99
Data over Cable Service Interface Specification (DOCSIS), 119–20
Davies, Donald: at ACM symposium (1967), 46, 53; “Digital Communication Network” proposal, 45–46, 53–57; isarithmic network proposal, 64–65, 247n73; at NPL, 45, 53, 81; on queuing, 106–7; and time-sharing, 53
Deep Packet Inspection (DPI), 99; and copyright enforcement, 226; government, 225; hardware for, 98–99, 121; of HTTP traffic, 100; industry value, 93, 99; iPoque, 100; OpenDPI, 100–101; Packeteer PacketShaper 8500, 174–81; privacy implications, 102; probability and, 99, 126; Procera Networks’ use of, 100; and P2P protocol obfuscation, 121; of P2P traffic, 101, 124; Sandvine PTS 8210, 121–26; as security, 99, 101
delay: affects of, 143–47; buffering, 58, 135–36, 139; and control, 154; and flow control, 146–47; and social acceleration, 150–51
Deleuze, Gilles: accelerationism, 166; communication, 171; control, 40; control societies, 15, 41–42, 171, 240n53; diagrams, 13, 74–75; dividuality, 192–93; mediators, 196; metastability concept, 42; modulation, 41; rhizomes, 164; on the war machine, 164, 180
DeNardis, Laura, 96–97
Dewey, John, 20, 189, 194–95, 206–7
diagrams, 13; Comcast’s infrastructure, 118, 127; and daemons, 14, 75–76; Deleuze and Guattari on, 74–75; and flow control, 13; Foucault on, 74; of the internet, 82–85; and internet history, 75; and protocols, 75
Differentiated Services (DiffServ) protocol, 110
digest networks, 87
Digital Rights Management (DRM), 145, 224, 263n32
digital sublime, the, 141
discrimination, 21, 29, 50, 116, 126, 131
distance-vector routing, 103–4
Distributed Denial of Service (DDoS) attacks, 167
distributive agency: and accountability, 202–3; and flow control, 41, 112, 209; novelty of, 57; in “Pandemonium,” 13–14
dividuality, 192–93
domain name seizures, 217
Domain Name System (DNS), 218, 224
dromology, 141
Dynamic Adaptive Streaming over HTTP (DASH), 100
Electronic Frontier Foundation (EFF), 88, 117, 125–26
email, 42, 66, 84, 87, 148, 176, 236
enchantment, 131–32
End-to-End principle (E2E), 80, 94, 113–15, 125, 253n80
escalationism, 165, 171, 180; vs. accelerationism, 178–79; and confrontation, 166, 181; and flow control, 180–81; IPREDator as, 179; and obfuscation, 99, 120–21, 174, 179, 181; and optimization, 182; and piracy, 179, 181–82; tactics of, 179–80; TOR, 90, 172, 179. See also virtual private networks
Facebook: as algorithmic media, 21, 190; as human content moderation, 226; Instant Articles, 223; Local Awareness, 222; news feed, 131, 221; as platform, 220–21; sentiment analysis, 221; TPB’s use of, 167, 183; use of HTTP, 99
Federal Communications Commission (FCC): Comcast investigation, 2–3, 116, 121, 212; and net neutrality, 17, 141; on right to regulate internet, 3; Verizon investigation, 146
FIDONET, 89
File Transfer Protocol (FTP), 66, 84, 99, 175–76
Fleischer, Rasmus, 164–68, 171, 181
FlowCommand (Saisei Networks), 129–30, 132, 181
flow control, 4–5, 14, 42, 67; as affective influence, 138–39, 142, 149–50, 152, 157; daemons enabling, 4–6, 41–42; and delay, 145; and diagrams, 13; as discrimination, 126; as distributive agency, 41; gateways, 73, 80–82, 105; as inter-network relation, 68–69; Kleinrock on, 16, 59, 247n53; and metastability, 42; and net neutrality, 20–21; and network diversity, 211; and nudge theory, 145–46; and optimalities, 42; Packeteer PacketShaper 8500, 175–79; via packet inspection, 102; in Pandaemonium, 132–33; policy management, 110–12; and queuing, 59; routing as, 60; and social acceleration, 150–51; and social temporalities, 148–49; Software-Defined Networking, 93, 111–12; stakes of, 210–11; and tiers, 210; traffic accelerators, 109; traffic shaping, 108–9, 176–77. See also Deep Packet Inspection; Interface Message Processors; optimization; packet inspection; packet switching; Peer-to-Peer networking; queuing; routing
flows, 35
Ford–Fulkerson algorithm, 12
Foucault, Michel, 13, 39, 74, 223, 225
Frank, Howard, 62–63, 247n65–66
Galloway, Alexander, 13–15, 41, 75, 219
gamer publics, 195–96, 199, 202. See also Rogers Internet connection issues
Gatlinburg ACM symposium (1967), 46, 51, 53, 55, 75
Gillespie, Tarleton, 21, 117, 138, 145, 224
Gnutella, 117–18
“good enough” data, 206–7
Google: Accelerated Mobile Page (AMP), 223; as algorithmic media, 21; Brillo, 220; content moderation, 226; and HTTP, 99; and IP enforcement, 224; and ISPs, 217; and machine learning, 219; News, 221; and SDN, 111; search algorithms, 21
Gore, Al, 90–91
Guattari, Félix, 74, 164, 166, 180, 256n28
Hayles, Katherine, 23, 25–27, 210
High Performance Computing Act, 90–91
human–computer interaction, 30, 143–45. See also man–computer symbiosis
Hypertext Transfer Protocol (HTTP): and DASH, 100; in internet measurement, 237–38, 238; and packet injection, 103; and packet inspection, 96, 99–100; and ports misuse, 99–100, 175; traffic shaping of, 175–76
Inferno operating system, 213–14
Information Processing Techniques Office (IPTO), 46–47, 52; IMP proposal paper (1967), 51–53; and Licklider, 47–49; and modern packet switching, 67; and NAC, 62; networking memo (1963), 48–49; researchers at, 48
information theory, 17, 26–28, 43
infrastructure: centralization of, 217; coaxial cable, 117, 119, 126; Comcast’s, 117–19, 126–28; computers as, 24, 34, 50; and control, 39, 215–16; for early networking, 50, 79; failures in, 185–86; internet fiber, 215; managed vs. unmanaged, 210; and media policy, 204; for mobile devices, 134
intellectual property, 161, 164, 172, 224, 226
Intellectual Property Rights Enforcement Directive (IPRED), 172, 174
Interface Message Processors (IMPs): as abstract components, 76–77; and ARPANET, 46, 57–61, 75; BBN on, 95; daemons replacing, 95; deprecation of, 80; diagram for, 73; functions of, 58–59, 95; as infrastructure, 79; IPTO proposal paper (1967), 51–53; Kleinrock on, 52; in modern network devices, 67, 77; monitoring of, 62; NAC’s reports on, 62–64; name origin, 52; and OLIVERs, 74; as optimistic, 104; as optimizers, 56, 62, 64; origins of, 14, 46, 56–57, 61–67; as protocological, 75; and queuing, 58, 107; routing functions, 58–60, 103–5; trace bits, 233; types of, 75, 77
internet, the: as competing operating systems, 214–15; diagram of, 82–85; fragmentation of, 219–20; as heterarchy, 91; layers of, 83–84; metastability of, 68, 91–92, 112–14; as multiple networks, 36, 85; optimization of, 113, 131–32; origins of, 72, 80, 90–91; as pandaemonium, 7, 94; reliance on daemons, 4–5, 7, 11, 46, 95, 209; and temporalities, 37; and vibrant materialism, 8. See also ARPANET
Internet Assigned Numbers Authority (IANA), 84
Internet Detailed Record Collector servers, 128
Internet Explorer, 135
internet measurement, 233; active, 235; ARPANET, 233–34; CAIDA, 234; Cerf on, 234; crowdsourced, 235–36, 238; frankenflows, 236–37; Glasnost, 196, 201, 237; Measurement Lab, 144, 196, 236; and mediators, 196–97, 205; need for, 187; Ookla’s Speedtest, 235; passive, 235; ping tool, 234; public participation in, 206; and regulation, 206, 236–37; reliance on HTTP, 238; as research, 234–35; SamKnows, 236; traceroutes, 234, 237; WeHe, 237
Internet of Things (IoT), 219, 227
Internet Protocol (IP) addressing, 84, 97
Internet Relay Chat (IRC), 90
internet service providers (ISPs): bandwidth caps, 123, 149; Bell Canada, 169–70; BitTorrent throttling, 2–3, 6, 20, 124–25, 169–70; Verizon, 103, 146, 216; zero-rating programs, 149, 208, 218, 236. See also Comcast; Rogers Communications
iPoque, 100
isarithmic networks, 64–65
ISC8 Inc., 98–99
Java, 213–14
Jennings, Tom, 89
Juniper Networks, 93, 108, 110–11
Kahn, Robert, 60–61, 67, 80–82, 84
Kleinrock, Leonard: on flow control, 16, 59, 247n53; and Frank, 63; on IMPs, 52; on Licklider, 49; at NMC, 233; queuing theory dissertation, 58–59
Kopimism, 163–64
lag. See delay
latency, 187
layering, 82–83
Licklider, J. C. R.: and ARPA, 47; career of, 29–30; “The Computer as a Communication Device,” 71–74, 85–86; at IPTO, 47–49; on man–computer symbiosis, 23, 29–32, 48–49; networking memo, 48–49; as optimist, 32, 48, 71
Lincoln Laboratory, 29–30, 32, 49–51
loading indicators, 155
MacKenzie, Adrian, 68, 138, 213
man–computer symbiosis, 23, 29–32, 48
Massachusetts Institute of Technology (MIT): Air Force funding of, 32; computing culture of, 47; “daemon” term origination, 18, 24; MULTICS, 38; Project MAC, 34, 38, 43, 45, 53–54, 59; SAGE, 32; time-sharing experiments, 32, 34–35
materialism, 17
Maxwell’s demon, 24–25; and cyborg sciences, 17–18, 23; influence of, 3, 23, 25–26, 42–43; as information processing, 26; and information theory, 17, 26–28, 43; as inspiration for computers, 28; and metastability, 42; origins of, 3, 227; reality of, 27–28; as symbol of control, 24, 41; and time-sharing computing, 38; Wiener on, 26–29
Measurement Lab (M-Lab), 144, 196, 236
media policy, daemonic, 202–8
mediators, 196; and daemons, 186–87, 196; and internet measurement, 233, 236, 238; and publics, 196–97; and regulation, 206
metastability, 28–29; of the internet, 68, 91–92, 112–14; Maxwell’s demon and, 28, 42; and nonsynchronous optimization, 133; and polychronous optimization, 132
Miller, Robert B., 143–44
Morris worm incident, 78
Motion Picture Association of America (MPAA), 161
Mueller, Milton, 188, 201, 226
Multiplexed Information and Computing Service (MULTICS), 38
Multi-Protocol Label Switching (MPLS), 110
MySpace, 222
National Science Foundation Network (NSFNET), 90–91, 250n67
Neij, Fredrik, 161, 167, 171, 182–83. See also Pirate Bay, The
Netflix, 100, 112, 146, 173, 216–17, 221
net neutrality: and bandwidth throttling, 2–3; Canada’s Network Neutrality Rules, 169, 188–89; difficulties of enforcing, 189; FCC, 17, 141; FlowCommand, 129–30, 132, 182; and flow control, 20–21, 68, 102; and internet infrastructure industry, 133; North American regulations, 131, 142; and polychronous optimization, 116; and user-centric management, 129
Network Analysis Corporation (NAC), 62–64
Network Control Program (NCP), 72–73, 78–80
Networking Working Group, 51
Network Measurement Center (NMC), 233–34
networks, 35, 86; relations among, 216; Scantlebury’s types of, 56; store-and-forward, 52, 54, 58; as synchronizations, 35–36; uneven time within, 36–37. See also ARPANET; internet, the
Nissenbaum, Helen, 172, 179, 181
nonsynchronous communication, 43, 45–46, 53–56, 245n100
nudge theory, 145
obfuscation, 99, 120–21, 172, 174, 179, 181
OLIVERs, 74–75
Onion Router, The. See TOR
Open Shortest Path First (OSPF) protocol, 105–6
operating systems (OS): Brillo, 220; connectivity of, 215; in daemonic media studies, 212, 227; and daemons, 212–14, 226; Inferno, 213–14; networked, 20, 214, 218, 226. See also control, networked techniques of
optimalities, 42, 64, 75, 113, 130, 133
optimization, 15, 62, 211; accelerationist, 181–82; of ARPANET, 61–67; automated, 130–32; and capital, 131; in daemonic media studies, 212; debates on, 61–62, 64–65, 91; decentralization of, 56–57; escalationist, 182; of the internet, 113, 131–32; limits of, 64; minimum transmission conditions, 112–13; nonsynchronous, 94, 113–15, 132–33, 210; as optimism, 15, 131–32; topological, 63–64. See also optimization, daemonic
optimization, daemonic: and ARPANET, 64; cultural impact of, 5–6; and flow control, 5, 67–68, 112–13; as optimism, 16; and sociopolitical concerns, 16–17. See also flow control; optimization, polychronous; packet switching
optimization, polychronous, 94, 115; and affect, 155–56; and bandwidth, 115–16; and entropy, 210; goal of, 209; managed infrastructure as, 210; and net neutrality, 116, 202; as policy issue, 134; and predictability, 210; Rogers’s SpeedBoost, 152; and temporalities, 133; trend towards, 133; and user affect, 19; user-centric traffic management, 126–30. See also Comcast
Packeteer PacketShaper 8500, 174–81
packet inspection, 96; ATLAS initiative, 98; and encryption, 97, 101; firewalls, 97–98; and flow control, 102; flow inspection, 101; and logging, 98–99; and machine learning, 101–2; measuring, 236–37; modern, 97, 102; and net neutrality, 102; and policies, 110; privacy implications of, 102–3; and protocols, 96–97; and traffic shaping, 108–9; and VPNs, 173. See also Deep Packet Inspection
packets, 96
packet switching, 4; CYCLADES project, 81, 107; in Davies’s proposal, 45, 54–56; diagrams of, 73; gateways, 73, 80–82, 105; infrastructures for, 81; IPTO’s contribution to, 46; and isarithmic networks, 64–65; modern, 67, 77; NCP, 72–73, 78–80; as optimization, 16; origins of, 4; “Pandemonium” as early example, 14. See also ARPANET; Interface Message Processors; routing
packet switching codification documents: ARPANET RFQ (1968), 57–61; IMP proposal paper (1967), 51–53; Licklider’s memo (1963), 48–49; Marill and Roberts’s report (1966), 49–51
“Pandemonium” program (Selfridge), 8–14, 240n34
Pasquale, Frank, 130–31
peering, 216–17
Peer-to-Peer (P2P) networking, 116; applications closed, 168; Ares Galaxy, 117–18, 124–25; bandwidth concerns, 122–23; BBS as inspiration for, 88–89; and cable networks, 120; and censorship, 117; as congestion, 122, 124, 169–70; eMule, 1, 3, 100, 116, 120; and E2E principle, 116–17, 120, 125–26; Gnutella, 117–18; ISP management of, 121–24, 133; ISP throttling of, 1–3, 6, 92, 94, 125, 169–70, 188; Napster, 116–18, 168; and piracy, 92; port spoofing, 99, 175; protocol obfuscation, 120–21, 175; and Sandvine PTS 8210s, 121–25. See also BitTorrent; Comcast; Pirate Bay, The
phreakers, 89
ping tool, 234
piracy: and accelerationism, 166, 181; centrifugal politics of, 163–64, 170; culture of, 88–89; and decentralization, 163–64; and escalationism, 179, 181–82; and formats, 219; mass, 116, 168; and Napster, 116; and nudge theory, 145–46; and political tactics, 165; and property regimes, 164; via P2P file sharing, 92. See also Pirate Bay, The
Piratbyrån (“Piracy Bureau”), 163; and accelerationism, 165–66, 168; and escalationism, 165–66, 181; Rasmus Fleischer on, 164–68, 171, 181; and the intellectual property regime, 164; Kopimism, 163–64; and The Pirate Bay launch, 163, 165, 167–68; and resisting daemons, 164
Pirate Bay, The (TPB), 161; as accelerating piracy, 168; and accelerationism, 166–71; administrator trial and arrest, 161–62, 182–83; British ban on, 166–67, 217; copyright politics of, 161–62; as eluding flow control, 162–63; and escalationism, 172–74, 179; hosting of, 170–71; IPREDator VPN, 172–74, 176–80; launch of, 163, 165, 167–68, 183; police raid on, 161–62, 182; policies of, 162; as political act, 167; relaunch of, 162; resilience of, 168, 170–71; size of, 170
pirate political parties, 165, 174, 182–83
Policy and Charging Control (PCC), 134
policy management, 110–12
Policy Traffic Switch (PTS) 8210, 121–25
political bots, 222
power: algorithmic, 21; constituent vs. constituted, 39, 41; and control, 39; control societies, 15, 41–42, 171, 240n53; diagrams describing, 13, 18, 74; and materiality, 11; “netscapes” of, 115, 130; and time, 68, 152. See also control, networked techniques of; flow control
priming (affect theory), 138–39
privacy, 90, 121–22, 172, 179. See also escalationism; Virtual Private Networks
Procera Networks, 93, 100, 134
progress bars, 155
Project MAC, 34, 38, 43, 45, 53–54, 59
protocols, 51, 96; administration of, 218; consequences of, 219; Galloway’s theory of, 75; Open Shortest Path First, 105–6; as political, 96–97; and routing, 103–4; VPN, 173
publics, 186; and daemons, 186, 192–93, 195; forming of, 191, 194–95; gamer, 195–96, 199, 202; and information, 194; and institutions, 205; as intelligences, 194; and the internet, 186; and mediators, 196–97; and nonhumans, 195; problematic, 206; recursive, 195; reflexive apparatuses in, 191–92, 197; research by, 194–95; scope issues, 207; and self-awareness, 207–8; and systematic care, 207–8. See also Rogers Internet connection issues
queuing, 106; “class-based weighted fair,” 108–9; IMPs, 107; “leaky bucket” algorithm, 107–8; measuring, 237; and prioritization, 109–10; round-robin technique, 106–7; theories of, 58–59; in time-sharing computing, 59, 106–7; “token bucket” algorithm, 108; traffic shaping, 108–9
real-time computing, early, 32–33, 43, 243n51. See also Semi-Automatic Ground Environment
reflexive apparatuses, 191–92, 197
reification, 11–12
“reply girls,” 222
reset packets, 125–26
resisting. See accelerationism; escalationism
Resource reSerVation Protocol (RSVP), 110
rhizomes, 164
Roberts, Lawrence, 49–51, 53, 57
Rogers Internet: CRTC findings against, 201–2; and DPI, 169–70; “Not Fair” ad, 150–53; packet injection practices, 103; and P2P, 169–70, 187–88, 198–99, 201; Rogers Alerts, 222; “SpeedBoost” ad, 142–47; and traffic management devices, 198–99; upstream traffic management, 187–88, 201
Rogers Internet connection issues, 185, 187; accountability for, 203; awareness-raising tactics, 190–91, 194; CBC reporting on, 201; and CGO, 200–201; CRTC involvement, 198–202; difficulties addressing, 186, 193–94; forum discussions, 187–89, 193; gamer research on, 187–90, 193, 196, 198; gamers as a public, 191–93; lack of information, 190; and mediators, 196; Teresa Murphy and, 197–200, 204–5, 207; P2P theory, 198–99; Shifthead’s posts, 187, 194, 196; traffic management theory, 198–200
routing, 103, 106; adaptive, 56, 65; “best efforts” method, 107; BIRD, 106, 252n53; boomerang, 216–17; daemons’ role in, 60–61; distance-vector, 103–4; and domains, 103; hot-potato, 56, 60; by IMPs, 58–60, 103–4; link-state, 104–5; measuring, 237; policy-based, 111; protocols for, 103–6; in telephone engineering, 59–60
Saltzer, Jerome, 113–14, 253n80
Sandvine: Congestion Management FairShare servers, 128; on DPI, 99; FairShare policy management, 122, 125; internet measurement, 235; Policy Traffic Switch 8210, 121–25; Policy Traffic Switch Daemon, 121–22, 125–26, 128; on P2P management, 2, 122–23, 254n15
security: ATLAS program, 98, 175, 226; AUTOVON, 50–51; control via, 223–27; via DPI, 225–26; encryption, 97, 101, 173; firewalls, 77–78, 97–98; Foucault on, 223; and government surveillance, 225, 266n86; and intellectual property, 224; mechanisms of, 224–25
Selfridge, Oliver, 8–14, 74, 240n34
Semi-Automatic Ground Environment (SAGE), 32, 35–36, 68
Semi-Automated Business Research Environment (SABRE), 33, 35
shortest-path-first algorithms, 105
sigils, 136
Simple Network Management Protocol (SNMP), 119–20
Singapore, 225
Snowden, Edward, 97, 225, 266n86
social acceleration, 150–51, 153–54
social media, 36–37, 90, 200, 221–22. See also Facebook
societies of control, 15, 41–42, 171, 240n53
Software-Defined Networking (SDN), 93, 111–12
speed, 140–41, 147, 154. See also accelerationism
standards, 218–19, 263n32. See also protocols
Stanford Blue Box, 85
store-and-forward networks, 52, 54, 58
“structures of feeling” concept, 19, 139–40, 149, 190
Sunde, Peter, 161–62, 167, 173, 182–83. See also Pirate Bay, The
Supervisor program (CTSS), 34, 37–38, 45, 244n61
surveillance, government, 225
synchronization, 35–36
System Development Corporation, 50
System Response Time (SRT), 143–44
Taylor, Robert, 67, 71–74, 85–86
technological fixes, 92
Telecomix, 172
telegraphy, 36–37, 41, 52, 152
telephony, 50–51, 59–60, 88–89
temporalities, 37, 147; and communication, 113; comparative value of, 35, 60–61, 67–68; of networks, 35, 60–61, 67, 86, 90–91; and polychronous optimization, 115, 133; and publics, 192; social, 147–49, 153; and time, 37. See also time
Theory of Heat (Maxwell). See Maxwell’s demon
thermodynamics, 3, 7, 25–26, 38. See also Maxwell’s demon
Third Generation Partnership Project (3GPP), 134
time: and air travel, 152; and algorithmic trading, 140; annihilation of, 141; bio-political economy of, 152; and Chicago Commodity Exchange, 36; and the internet, 37; and man–computer symbiosis, 30–31; and networks, 35–37; and New York Stock Exchange, 37; and nonsynchronous communication, 245n100; and speed, 154. See also temporalities
time-sharing computing, 33–35, 43, 47, 54, 59. See also Compatible Time-Sharing System; Project MAC
“token bucket” algorithm, 108
TOR (The Onion Router), 90, 172, 179
traceability problem, the, 203–4
traceroutes, 191, 196, 233–34, 237
traffic accelerators, 109
traffic management, Canadian, 201
traffic shaping, 108–9, 176–77
Transmission Control Protocol and Internet Protocol (TCP/IP), 66, 80, 84, 90, 97
Transport Control Program, 80, 84
tunnels, 165, 171–73, 175, 181, 193
User Datagram Protocol (UDP), 84, 98
vibrant materialism, 7–8
virtual communities, 88
virtual private networks (VPNs), 172–74, 176–80
waiting, 153–56
Warg, Gottfrid Svartholm, 161, 167, 182–83. See also Pirate Bay, The
Warner, Michael, 191–92
web browsers, 96, 101, 135, 155, 220
Whole Earth ’Lectronic Link (WELL), 88
Wiener, Norbert: on demons, 3; on duration and machines, 31; on entropy, 3, 28, 210; and information theory, 26; on Maxwell’s demon, 25–29, 43; on metastability, 28–29; pessimism toward computing, 48
Wilkinson, Roger I, 60
wirelessness, 138
women, marginalization of, 29
wonkish populism, 207
World of Warcraft. See Rogers Internet connection issues