Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


ta77

2 posts

Wannabe Geek


#77727 21-Feb-2011 18:22
Send private message

I don't know much about the technical details, but this thought occured to me the other day and i don't know any other 'techie' people to ask.

Imagine two computers on the internet, computer A and computer B. My crude understanding is that if A wants to download something from B, A first sends some kind of 'request' to B. B then sends the data and addresses it to A. The ISP then forwards this data to A and logs it as "download usage".

So my question is this: what happens if B sends data addressed to A without A requesting it first? 

Does the ISP still forward this data to A, only for A to discard it because it wasn't expecting it? If so, does the ISP have some way of checking that A really did request the data, or does this data get recorded as download usage by the ISP regardless?

Create new topic
richms
28173 posts

Uber Geek

Trusted
Lifetime subscriber

  #442046 21-Feb-2011 18:32
Send private message

That is basically flooding A's connection, and yes it does count. There is no required proof of accuracy or standards for ISP bandwidth recording so noone really knows what the hell they are counting to come up with the numbers that they give you.

For it to not count, the ISP would have to run a stateful firewall outside of the traffic counters, and really, what benefit do they have to do that when all it would do is decrease what they end up charging people?

If IP address's do start to really run out, we might see some budget internet plans going behind ISP side NAT which would achieve this outcome. That will bring some other hassles tho like who do you blame when someone does piracy on that IP etc.




Richard rich.ms



snnet
1410 posts

Uber Geek


  #442056 21-Feb-2011 19:01
Send private message

Often this type of traffic, in a sense, is called "overhead" traffic, when it is not requested and not "sent" as such on purpose (on purpose meaning by a human being) - it is a normal byproduct of the Internet (excluding of course things like botnets running denial of service attacks etc)

michaeln
238 posts

Master Geek

Trusted

  #442075 21-Feb-2011 19:26
Send private message

Complexity,

  1. costs money

  2. is slow

usually both.

Normally, every byte that goes through a connection (as opposed to low level overhead chatter between the ISP and the customer) is simply counted. In both directions.

The IP protocol in general does not have a concept of "request", "connection" or "session". There are such things, layered onto the IP protocol, but they are, so to speak, extra. (layers 4-6 of the OSI model). Most accounting happens at layer 3 (but not, generally, at layer 2. If it did, then overhead such as ARP would also count and it usually doesn't).

If you wanted to pay less in order to pay only for traffic you originated, or requested, then the ISP would need to put in place (very expensive) equipment to track that usage. The net result would most likely be that it would cost more to send you a bill, which is probably not what you wanted. (Actually, some ISPs do offer a 'clean Internet' service where you get only what you asked for. This service is generally remarkably expensive, for the reasons I've just described).

If you send a simple UDP message to a server, there is no real way for the ISP to determine whether this was a request for the contents of the Library of Congress, or an inflammatory poke at 4chan, without looking deeply at the packet---potentially having some intelligent entity read the contents of the packet. The somewhat uncomfortable result is that several terabytes of data is heading your way in either case. If that is indeed what you want, you might want to spend some time thinking carefully about the implications. For example, since the ISP has no way to determine if a stream of UDP packets is actually accepted by the host computer or simply discarded, if the ISP did not charge for 'unsolicited' incoming traffic, then it would be all of several femtoseconds before someone created a service where a 'completely unrelated' message sent to one IP address resulted in scads of 'unrequested' (cue Tui billboard) data appearing at the customer address.



ta77

2 posts

Wannabe Geek


  #442105 21-Feb-2011 20:50
Send private message

thanks for all the replies.

I wasn't thinking so much about being charged for overhead traffic (I accept this is simply part of using the internet) but rather the possibility of someone getting nasty and flooding a connection for the purpose of running up large overage bills on the target account.

Create new topic





News and reviews »

Air New Zealand Starts AI adoption with OpenAI
Posted 24-Jul-2025 16:00


eero Pro 7 Review
Posted 23-Jul-2025 12:07


BeeStation Plus Review
Posted 21-Jul-2025 14:21


eero Unveils New Wi-Fi 7 Products in New Zealand
Posted 21-Jul-2025 00:01


WiZ Introduces HDMI Sync Box and other Light Devices
Posted 20-Jul-2025 17:32


RedShield Enhances DDoS and Bot Attack Protection
Posted 20-Jul-2025 17:26


Seagate Ships 30TB Drives
Posted 17-Jul-2025 11:24


Oclean AirPump A10 Water Flosser Review
Posted 13-Jul-2025 11:05


Samsung Galaxy Z Fold7: Raising the Bar for Smartphones
Posted 10-Jul-2025 02:01


Samsung Galaxy Z Flip7 Brings New Edge-To-Edge FlexWindow
Posted 10-Jul-2025 02:01


Epson Launches New AM-C550Z WorkForce Enterprise printer
Posted 9-Jul-2025 18:22


Samsung Releases Smart Monitor M9
Posted 9-Jul-2025 17:46


Nearly Half of Older Kiwis Still Write their Passwords on Paper
Posted 9-Jul-2025 08:42


D-Link 4G+ Cat6 Wi-Fi 6 DWR-933M Mobile Hotspot Review
Posted 1-Jul-2025 11:34


Oppo A5 Series Launches With New Levels of Durability
Posted 30-Jun-2025 10:15









Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.