Appendix I & II are frighting in their casual use of major headings. Looks an awful lot like the fabled "tier-ed internet".
Heck, one of the diagrams even categorizes IP traffic in 4 levels: Gold, Silver, Bronze, P2P. I'm not an owner of tinfoil hats, but this has a lot of implications to a distributed web.
Appendix Examples:
I.2.1 Differentiated services based on service identification
I.2.2 Traffic monitoring
I.2.4 Traffic statistics and services-based billing
I.3.1 DPI used as a bidirectional tool for service control
I.5 DPI use case: Traffic control
I.5.3 DPI-based policing of peer-to-peer traffic
I.9.2 DPI engine use case: Simple fixed string matching for BitTorrent
II.4.11 Example “Identify uploading BitTorrent users”
II.4.13 Example “Blocking Peer-to-Peer VoIP telephony with proprietary end-to-end application control protocols”
Heck, one of the diagrams even categorizes IP traffic in 4 levels: Gold, Silver, Bronze, P2P. I'm not an owner of tinfoil hats, but this has a lot of implications to a distributed web.
Appendix Examples: I.2.1 Differentiated services based on service identification
I.2.2 Traffic monitoring
I.2.4 Traffic statistics and services-based billing
I.3.1 DPI used as a bidirectional tool for service control
I.5 DPI use case: Traffic control
I.5.3 DPI-based policing of peer-to-peer traffic
I.9.2 DPI engine use case: Simple fixed string matching for BitTorrent
II.4.11 Example “Identify uploading BitTorrent users”
II.4.13 Example “Blocking Peer-to-Peer VoIP telephony with proprietary end-to-end application control protocols”