Talk:Deep packet inspection
|WikiProject Internet||(Rated C-class, Top-importance)|
|WikiProject Computing / Networking||(Rated C-class, Low-importance)|
- 1 Comment from 22.214.171.124
- 2 Points not clear in this article
- 3 Lawful Inspection?
- 4 Vendor presence in this article
- 5 Ellacoya on this page
- 6 Kerio Winroute
- 7 NPOV
- 8 External references
- 9 False statements without reference
- 10 Removed Refimprove
- 11 Removed weasel
- 12 Encryption
- 13 See also
- 14 Reversion of edits
- 15 Knology
- 16 Bias
- 17 Legality
- 18 The introductory sentence is missing a verb
- 19 Australia to use DPI
- 20 Poor citation
Comment from 126.96.36.199
DPI allows phone and cable companies to "readily know the packets of information you are receiving online--from e-mail, to websites, to sharing of music, video and software downloads" - as would a network analysis tool. <---seems a bit too political and unencyclopedic...citations or not.
Points not clear in this article
- BACKGROUND section is completely out of the scope and this section which should introduce the theme is only restricting. neorider 12:00, 28th June 2012 (UTC)
- Why do ISPs not generate revenue from delivering P2P traffic to their subscribers? How does this differ from non-P2P traffic?
- Don't ISPs generate revenue from subscriptions by customers who want this service? Won't there be "customer churn" if the provider fails to supply good P2P service?
- What does it mean when "P2P traffic goes off-net"?
- Why is this a problem? For small vendors in particular?
- What are the costs associated with P2P?
- What does "has emerged from the enterprise world" mean? Was this technology already developed and used for other things? If so, what, and where did it come from? Or was it simply developed to deal with the P2P problem? In which case why not say that instead of mushing about the "enterprise world"?
- Why do smaller DSL operators suffer most from P2P-generated off-net traffic?
- What's the significance of DPI "alongside" IPTV?
I have no axe to grind; the article just seems slightly one-sided, and it assumes familiarity with issues whose significance the general reader won't understand. Elphion 18:28, 29 September 2007 (UTC)
Is DPI going to be become a solution, or part of a solution - for Lawful Intercept?
- Yes. CALEA lawful interception is done at Traffic access points. Some DPI products that are "CALEA-compliant" can be used as a TAP to collect a user's datastream. But generally a DPI is much too expensive for this function. TAPs are typically intercepting proxy servers. TAP vendors include Fluke Networks, Network Critical and NetOptics.Kgrr (talk) 17:05, 1 March 2008 (UTC)
Vendor presence in this article
Per WP:EL, WP frowns on external links in articles. Wikipedia is not a directory. Companies that are notable enough to be on this page should have WP articles. Be forewarned that your company's article may be deleted if you can't stake a claim for notability, and that claim is harder to defend if you write an article for your own company.
I've scrubbed the article down to notable companies and, per Network Access Control, reworded the vendor list to a "See also", which is the proper wikified way to list the section. "See also" links point exclusively to Wikipedia articles.
--- tqbf 00:36, 7 December 2007 (UTC)
Ellacoya on this page
I wouldn't AfD an article about Ellacoya --- start one here if you'd like. A long time ago, I worked at an Ellacoya competitor (I have no financial interest in this space whatsoever anymore).
However, until you do add that article, do not add links to Ellacoya to this article. Wikipedia is not a directory, and "See also" sections shouldn't have extlinks. See WP:EL.
--- tqbf 14:09, 7 December 2007 (UTC)
- I agree that the title of this article is ambiguous, but nobody is ever going to deploy this product at a service provider. The same logic calls Tcpdump "DPI". The article is talking about high-speed deep packet inspection; the concept of forwarding packets based on application-layer details, something service providers cannot yet do effectively. --- tqbf 00:45, 10 December 2007 (UTC)
- Although the article does mention DPI's purpose for ISPs and other large networks, it does not rule out the use of DPI in smaller settings. Smaller applications implementing DPI with a wide user base is still quite valid for the purpose of this article.
- The first sentence says "viruses, spam, intrusions or predefined criteria to decide if the packet can pass or if it needs to be routed to a different destination, or for the purpose of collecting statistical information. It also called Content Inspection or Content Processing". WinRoute is capable of performing almost all of the above. If the intro did say something about high speed DPI in specialised hardware boxes, then I wouldn't have put the Winroute link in. Maybe there should be a new section talking about DPI in non-service provider scenarios. Shootthedevgru (talk) 01:01, 10 December 2007 (UTC)
- I understand where you're coming from, and I don't blame you for bringing this up. But "Deep Packet Inspection" is an industry term that connotes "high speed". It is not computer science-interesting to perform DPI functions at low speeds or on Windows end-stations; a typical end-station doesn't generate enough traffic to make that a hard problem.
- The irony here is that products like yours probably perform more "deep packet" inspection than DPI products; DPI products push the limit of what can be done at 10-100 gig speeds, and are limited to relatively superficial functions (like "detecting BitTorrent").
- I buy that this article could be renamed, and definitely that the lede could be cleaned up. But it has no meaning if it covers host firewalls or software intrusion prevention products for small/medium enterprises. --- tqbf 01:07, 10 December 2007 (UTC)
- By the way, thanks for taking the time to write here; less careful editors would just revert the changes. --- tqbf 01:08, 10 December 2007 (UTC)
This article was marked with an NPOV tag here. I will respect that. However, tagging an article with NPOV is insufficient and must be accompanied by an objection which must be resolved.
I found the article to be written from the Open Internet viewpoint. And both sides of the Network Neutrality argument are not represented here. Also, the article was written from a viewpoint that makes the service providers look like they have a need to spy on people. On the whole this is not true.Kgrr (talk) 14:21, 2 March 2008 (UTC)
- I feel that the section on DPI at ISPs needs to be reviewed again. It seems to was edited too far in the other direction. While the information provided (About the motives behind some (which?) ISP's using DPI may be true, the tone is far from neutral, and this article is not balanced any longer because of the ISP-Favoring leaning of this section. I can clarify, if needed, however I feel the tone of this entire section needs to be changed. Ill look through the history and try to find a happy middle ground... Nigtv (talk) 02:49, 8 April 2010 (UTC)
I removed the reference to https://www.dpacket.org/ because it appears to be spam to a pro-net neutrality blog. I will attempt to summarize the DPI/Net Neutrality argument and will use solid references instead.Kgrr (talk) 14:21, 2 March 2008 (UTC)
False statements without reference
I deleted the following false statement: " In the U.S., multiple system operators large cable operators were early adopters of the technology. This is because Cable Operators faced greater challenges than DSL providers in the last mile. For a Cable Operator, the last-mile bandwidth is shared among users, whereas in a DSL network a dedicated link is established for each subscriber. Smaller DSL operators were generally early adopters of DPI, as they suffered most from P2P-generated off-net traffic and peering costs."
Both DSL and Cable providers have problems with bandwidth abuse. Cable operators offer a large shared bandwidth from the subscriber's cable modem to the cable router. The cable router in turn is connected to an aggregation router at the POP via a fiber link. On the other hand, DSL providers have a limited bandwidth from the subscriber's DSL modem to the DSLAM. The DSLAM in turn is connected to an aggregation router at the POP via a fiber link. In both cases P2P traffic from applications like Napster, Gnutella and most recently BitTorrent are a three-fold concerns for the ISP: CALEA, Bandwidth and having to deal with Copyright letters from the RIAA and the MPAA.Kgrr (talk) 22:18, 2 March 2008 (UTC)
- DPI can proxy HTTPS, SSH and DNS tunnels and insert themselves in the middle or block them altogether. It's not a non-issue.Kgrr (talk) 14:44, 27 November 2008 (UTC)
I removed the following link from the see also section:
- dPacket.org - A nonprofit user-driven community for deep packet inspection and processing topics (dPacket.org)
The See also section is for internal links inside Wikipedia only. Wikipedia is not a collection of links, it's an encyclopedia. If it's important information, feel free to add it to the article and properly reference it. However, as such, dpacket.org is a blog site and not what would qualify as a credible source. The bylines don't have real names, there are no dates on the articles and furthermore, the site is not published. Please read WP:REF. Kgrr (talk) 15:02, 12 March 2008 (UTC)
Reversion of edits
I cleaned up a couple of drive-by edits. The edits substantially changed the meaning of the sentences. 1) Copyright filtering is a subset of copyright enforcement. DPI can be used in other ways to help enforce copyrights other than just filtering-out items that are copyrighted. 2) DPI can look into both headers and the data. Kgrr (talk) 14:38, 27 November 2008 (UTC)
"US ISPs monitoring their customers include Knology," - This statement is not backed up by the citation, which is a link to a Charter page (a wholly different ISP) that says "Charter Communications is not providing enhanced online advertising services at this time." —Preceding unsigned comment added by 188.8.131.52 (talk) 05:20, 18 April 2010 (UTC)
As i understand that ISP's are using "Deep Packet Inspection" (DPI) to intercept data communications but doesnt that breach our privacy rights?
As under the Privacy and Electronic Communications (EC Directive) Regulations (PECR) and the Regulation of Investigatory Powers Act (RIPA) as well as the European ePrivacy Directive, that interception and processing of communications requires either explicit informed consent from all parties or a warrant.
Hence ilegal. !
It should be noted that there is no exemption in the regulations for the purpose of detecting illicit copyright infringement – and indeed in such cases where interception is being used for law enforcement, a warrant is required.
The introductory sentence is missing a verb
Australia to use DPI
Recently, the AU government has announced plans to introduce DPI as a 'counter terrorism'
According to Walid Al-Saqaf, the developer of the internet censorship circumventor, Alkasir, in February 2012 Iran used deep packet inspection, bringing internet speeds in the entire country to a near standstill. This briefly eliminated access to tools such as Tor and Alkasir.
This briefly mentions Deep packet inspection, but I don't really see a timeline or a reference to tor in it. Could somebody look at this? — Preceding unsigned comment added by 184.108.40.206 (talk) 20:13, 10 December 2012 (UTC)
- Here is a related comment left on the page at the end of Iran section (right after section quoted above.) Moved here mostly because it was breaking page layout. 220.127.116.11 (talk) 09:04, 7 April 2013 (UTC)
The above information is not accurate. Currently there is just SPI in Iran, they block anonymity tools using IP filtering. Due to mass bandwidth usage in Iran, they can not permanently and efficiently use DPI.