ARCHIVÉ -  Transcription de l'audience

Cette page Web a été archivée dans le Web

L’information dont il est indiqué qu’elle est archivée est fournie à des fins de référence, de recherche ou de tenue de documents. Elle n’est pas assujettie aux normes Web du gouvernement du Canada et elle n’a pas été modifiée ou mise à jour depuis son archivage. Pour obtenir cette information dans un autre format, veuillez communiquer avec nous.

Offrir un contenu dans les deux langues officielles

Prière de noter que la Loi sur les langues officielles exige que toutes publications gouvernementales soient disponibles dans les deux langues officielles.

Afin de rencontrer certaines des exigences de cette loi, les procès-verbaux du Conseil seront dorénavant bilingues en ce qui a trait à la page couverture, la liste des membres et du personnel du CRTC participant à l'audience et la table des matières.

Toutefois, la publication susmentionnée est un compte rendu textuel des délibérations et, en tant que tel, est transcrite dans l'une ou l'autre des deux langues officielles, compte tenu de la langue utilisée par le participant à l'audience.

TRANSCRIPTION DES AUDIENCES DEVANT

LE CONSEIL DE LA RADIODIFFUSION

ET DES TÉLÉCOMMUNICATIONS CANADIENNES

SUJET:

Examen des pratiques de gestion du trafic Internet des fournisseurs de services Internet

TENUE À:

Centre de conférences

Salle Outaouais

140, Promenade du Portage

Gatineau (Québec)

le 13 juillet 2009


Transcription

Afin de rencontrer les exigences de la Loi sur les langues

officielles, les procès-verbaux pour le Conseil seront

bilingues en ce qui a trait à la page couverture, la liste des

membres et du personnel du CRTC participant à l'audience

publique ainsi que la table des matières.

Toutefois, la publication susmentionnée est un compte rendu

textuel des délibérations et, en tant que tel, est enregistrée

et transcrite dans l'une ou l'autre des deux langues

officielles, compte tenu de la langue utilisée par le

participant à l'audience publique.


Conseil de la radiodiffusion et des

télécommunications canadiennes

Transcription

Examen des pratiques de gestion du trafic Internet des fournisseurs de services Internet

DEVANT:

Konrad von Finckenstein   Président

Len Katz   Conseiller

Suzanne Lamarre   Conseillère

Candice Molnar   Conseillère

Timothy Denton   Conseiller

AUSSI PRÉSENTS:

Sylvie Bouffard   Secretaire

Regan Morris   Conseiller juridique

Chris Seidl   Gérants de l'audience

Stephan Meyer

TENUE À:

Centre de conférences

Salle Outaouais

140, Promenade du Portage

Gatineau (Québec)

le 13 juillet 2009


- iv -

TABLE DES MATIÈRES

   PAGE / PARA

Union des consommateurs   829 / 4718

Rogers Communications Inc.   862 / 4891

Quebecor Media, on behalf of Videotron ltée   937 / 5332

Shaw Communications Inc.   990 / 5598


   Gatineau (Québec)

--- L'audience débute le lundi 13 juillet 2009 à 0902

4713   LE PRÉSIDENT : Bonjour.

4714   Madame la Secrétaire, commençons.

4715   LA SECRÉTAIRE : Merci, Monsieur le Président.

4716   Nous débuterons la journée six de notre audience avec l'item 24 à l'ordre du jour.

4717   J'inviterais maintenant l'Union des consommateurs à faire sa présentation. M. Anthony Hémond comparaît pour l'Union des consommateurs, et il nous présentera son collègue. Vous aurez 10 minutes pour votre présentation.

PRÉSENTATION

4718   M. HÉMOND : Bonjour. Je vous présente le professeur Mark Coates de l'Université McGill, expert en réseaux de communication, et je suis Anthony Hémond, avocat, analyste en télécommunication à Union des consommateurs.

4719   D'après les observations fournies par nombre de grands fournisseurs de services Internet lors de ces audiences, il n'existerait aucune définition de la congestion. Seulement, existe-t-il véritablement de la congestion sur les réseaux? L'on peut sérieusement douter, comme le professeur Coates vous l'expliquera.

4720   Admettons hypothétiquement qu'il y ait de la congestion, quelles en sont les causes?

4721   Les grands fournisseurs de services Internet, comme un seul homme, ont tous montré du doigt les applications peer-to-peer comme la cause de ces congestions. Cependant, la compagnie Arbor, qui fournit la solution Deep Packet Inspection à Bell, a mentionné dans ses observations au Conseil d'autres causes de la congestion des réseaux.

4722   LE PRÉSIDENT : Est-ce que vous pouvez ralentir parce qu'on a des traductions? Les traducteurs ne peuvent pas parler si vite.

4723   M. HÉMOND : Très bien. Merci.

"Congestion should be defined in an ISP's network to mean when arbitrary packets are discarded due to contention or over-subscription on the network." (Tel que lu)

4724   C'est écrit noir sur blanc, les causes de la congestion sont la contention et le surabonnement pratiqués par les Compagnies. On remarquera que les Compagnies n'ont jamais été appelées à se justifier sur ces deux éléments, qui seraient, en fait, les éléments réellement susceptibles de causer la congestion, contrairement à certaines applications.

4725   Aujourd'hui, les abonnés qui souhaitent utiliser leur connexion qu'ils paient tous les mois se voient limiter leur utilisation Internet. En effet, les Compagnies répondent que ce n'est pas possible d'utiliser toute la connexion disponible parce que le réseau est congestionné. Ou les Compagnies auraient-elles, sans investir suffisamment de capacité de réseau, vendu plus de bande passante qu'elles disposaient réellement?

4726   Est-ce dire que les Compagnies sont les artisans de leur propre malheur? Certainement, mais il serait inacceptable de leur permettre d'imposer des solutions néfastes telles que les pratiques de gestion du réseau qui limitent certaines applications pour remédier à la situation.

4727   Rappelons que : Nemo auditur propriam turpitudinem allegans.

4728   Le Conseil explique dans sa décision de politique réglementaire de radiodiffusion CRTC 2009-329, paragraphe 11 :

"Des technologies de diffusion d'un contenu de radiodiffusion d'excellente qualité sur les plateformes néomédiatiques sont aujourd'hui disponibles dans le commerce."

4729   Le problème avec la gestion du trafic Internet proposée par les Compagnies, c'est que les Canadiens risquent de ne pouvoir accéder à ces plateformes parce que certaines Compagnies de fourniture de services Internet ralentissent les connexions Internet.

4730   De plus, les Compagnies font payer au consommateur au prix fort leur utilisation de bande passante avec les nouveaux modèles proposés de facturation.

4731   Il faut accroître la présence de contenu canadien sur Internet. Encore faut-il que les Canadiens puissent y avoir accès. Les pratiques néfastes de gestion du trafic Internet sont les conséquences d'un manque de concurrence dans le secteur des télécommunications et de la convergence.

4732   Le Conseil va devoir évaluer l'impact de la convergence sur la structure des sociétés, sur la technologie et sur la clientèle. Dans ce contexte, il lui faudra tenir compte de multiples facteurs complexes, y compris, entre autres, la concentration de la propriété, la neutralité d'Internet, la qualité du service et son prix abordable, la libre concurrence, la protection du consommateur et la protection de sa vie privée.

4733   La véritable question n'est pas de savoir s'il faut réguler ou pas les pratiques de gestion du trafic Internet, le véritable problème ici en étant le contrôle sur les marchés de la radiodiffusion et des télécommunications. Les mêmes entreprises qui contrôlent les revenus de la radiodiffusion contrôlent les revenus d'accès Internet et ceux des télécommunications sans fil.

4734   Pour prendre votre décision concernant les pratiques de gestion du trafic Internet, vous devez tenir compte de l'ensemble de ces facteurs. Votre décision doit être fondée sur une vision globale du secteur des communications et non pas uniquement sur l'accès Internet.

4735   Si les applications peer-to-peer sont l'objet des pratiques de gestion du trafic Internet actuellement, c'est, comme le souligne la FCC, parce que celles-ci s'attaquent aux revenus de la radiodiffusion des Compagnies précédemment mentionnées.

4736   La Federal Communications Commission dans l'affaire Comcast a mentionné :

"Peer-to-peer applications, including those relying on BitTorrent, have become a competitive threat to cable operators such as Comcast because Internet users have the opportunity to view high-quality video with BitTorrent that they might otherwise watch (and pay for) on cable television. Such video distribution poses a particular competitive threat to Comcast's video-on-demand service."

4737   Ces attaques envers ces applications sont également motivées par des raisons économiques n'ayant strictement rien à voir avec la congestion des réseaux. Aujourd'hui, pourquoi le peer-to-peer est-il aussi la cible des Compagnies? Parce qu'elles souhaitent maintenir un système de discrimination des prix qui sont à leur avantage bien plus qu'à celui des consommateurs. Les revenus par Megabyte en fonction du service illustrent bien ce fait.

4738   Les revenus des trois premiers services mentionnés dans le tableau précédemment sont tous menacés par les applications peer-to-peer innovantes. La gestion du trafic Internet proposée par ces quelques Compagnies ne répond en aucune façon aux exigences nouvelles des abonnés.

4739   De plus, le ralentissement de certaines applications ne fait que nuire à l'établissement d'une nouvelle gamme de services innovants comme ceux proposés par la société Zip.ca qui a témoigné plus tôt la semaine précédente ou comme les projets d'utilisation de BitTorrent par la Canadian Film and Television Production Association ou la CBC.

4740   Par le passé, le Conseil a généralement appuyé les projets d'implantation de nouvelles technologies mis de l'avant par les compagnies de téléphone. Il reconnaît que l'infrastructure des télécommunications doit toujours évoluer afin de satisfaire aux exigences nouvelles des abonnés de résidence, d'affaires et institutionnelles relativement à l'expansion de la gamme des services.

4741   Les tentatives visant à limiter, pour des motifs d'ordre technologique, les services que les compagnies de téléphone peuvent distribuer ne feraient que ralentir la conception de services perfectionnés et innovateurs. C'est la décision Télécom CRTC 94-19, examen du cap de réglementation.

4742   Les Compagnies viendront, par la suite, arguer qu'elles ne peuvent investir pour augmenter la capacité des réseaux, ce qui est fallacieux, et ce, d'autant plus que des exemples dans d'autres pays ont prouvé le contraire.

4743   Free en France ou Cablevision, voire Verizon, aux États-Unis proposent des services Internet illimités pour certains à plus de 100 Megabits par seconde et s'en portent économiquement fort bien, malgré l'investissement que ces services ont requis ou grâce à lui.

4744   Ainsi, si certaines entreprises refusent d'investir et nuisent au développement des télécommunications au Canada, il appartient au Conseil d'examiner d'autres modèles et solutions utilisés à l'étranger pour satisfaire les exigences des objectifs de la Politique canadienne de télécommunication.

4745   Le Conseil, dans son rapport de surveillance, précise :

"En vertu de ce principe, les divisions Réseaux des titulaires doivent devenir des unités autonomes, et l'exploitant titulaire doit fournir sans discrimination des services de gros à lui-même et à ses fournisseurs de communications rivaux pour favoriser une saine compétition dans la prestation de services de détail aux particuliers et aux entreprises."

4746   Cette séparation fonctionnelle aurait pour effet de mettre un terme au conflit dans les services de gros d'accès Internet quant aux vitesses proposées par les entreprises ou encore même la possibilité d'accéder aux réseaux de nouvelles générations.

4747   Enfin, je terminerai par cette citation de British Telecom :

"It's up to us at the core of the network to make sure there is enough bandwidth."

4748   MR. COATES: Good morning.

4749   The Presence of Congestion.

4750   Network congestion arises when a large traffic load is concentrated on a link so that the quality of service deteriorates for the competing flows. Two metrics used to detect and define congestion are the rate of dropped packets and the average queuing delay.

4751   When a flow experiences packet drops or high delays, the Transmission Control Protocol, TCP, reduces its rate. This lessens congestion but it means that all the competing flows have a lower rate. This rate may not be sufficient for some time-sensitive applications.

4752   In order to motivate the network-management method of throttling a specific application, there should be clear measurement-based evidence that there is congestion in the network, time-sensitive applications are experiencing unsatisfactory quality of service, and the throttled application is a significant cause of the congestion.

4753   There is little publicly available empirical evidence that these conditions exist. Utilization data cannot be accurately mapped to average loss rate or delay metrics, nor does it provide any information about the impact on time-sensitive applications. It is not clear from the presented data that peer-to-peer applications are the primary cause of the congestion, if it does exist.

4754   The Absence of Exponential Traffic Growth.

4755   The emerging data on traffic volumes does not show the exponential growth that was predicted in 2006 and 2007.

4756   The attached data of Perkins Human Usage in the Bell network shows a clear linear trend over the past five years. Monthly average usage increased consistently by slightly under 2 gigabytes each year until 2008 when there was virtually no increase. The rate of growth is clearly decreasing.

4757   Similar results have been observed by researchers at the University of Minnesota and in a recent Japanese measurement study of six ISPs, the latter reporting an average growth rate in residential broadband traffic of only 27 percent over the last three years, with peer-to-peer traffic volume growing at an even smaller rate.

4758   Network Management Options.

4759   The modest growth rates in usage suggest that increasing network traffic can be accommodated by reasonable increases in network capacity. If network management is viewed as necessary, there are several options that do not involve application-specific throttling.

4760   During period of congestion, it is feasible to control the rates of individual users, reducing the rates of high-volume flows irrespective of the protocol employed. Differentiated service architectures provide a mechanism for prioritizing low-volume time-sensitive traffic.

4761   Packet Classification: Deep versus Shallow.

4762   In order to apply throttling mechanisms to a specific application it is necessary to classify each flow. The method used by most ISPs is Deep Packet Inspection. This involves processing the payload and the application layer header, searching for known signatures associated with specific applications.

4763   It should be noted that the existence of the application layer header is debatable since it is not specified in the OSI model. This raises privacy concerns, threatens robustness by violating layer design principles and promotes the practice of data encryption.

4764   Shallow Packet Inspection does not involve any examination of packet payloads. Instead, statistical features are collected for each flow. Based on these features, the flows can be classified into application classes.

4765   Experimental studies have shown that this classification approach can be very accurate but the classes must be more general.

4766   Shallow Packet Inspection is a viable alternative to Deep Packet Inspection. The classes are sufficiently specific for network management. The technique alleviates any privacy concerns and it is unaffected by payload encryption.

4767   Working with Peer-to-Peer Applications.

4768   ISPs can adopt positive approaches to improve the way peer-to-peer applications operate, benefiting both the users and the access network.

4769   The P4P Project promotes cooperation between peer-to-peer applications and the ISP. The proposed P4P architecture and other techniques for proximity-based peer selection result in much more localized exchange of data.

4770   Field testing indicate that the methods both improved the performance perceived by the user and reduced cross-ISP traffic and the load on ISP aggregation links.

4771   THE CHAIRPERSON: Thank you very much for your presentation.

4772   Premièrement, ça fait beaucoup d'années que j'ai pris le latin. Est-ce que vous pouvez me donner une traduction du paragraphe 7?

4773   M. HÉMOND : Oui. Nul ne peut invoquer sa propre turpitude.

4774   LE PRÉSIDENT : Pardon?

4775   M. HÉMOND : Nul ne peut invoquer sa propre turpitude.

--- Rires

4776   LE PRÉSIDENT : Vous dites dans le paragraphe 11 que :

"Les pratiques néfastes de gestion du trafic Internet sont les conséquences d'un manque de concurrence dans le secteur des télécommunications et de la convergence."

4777   Franchement, pourquoi croyez-vous que plus de concurrence évitera les problèmes de congestion? Je ne vois pas nécessairement la connexion entre l'une et l'autre.

4778   M. HÉMOND : Actuellement, les entreprises qui contrôlent les infrastructures de télécommunication contrôlent également les revenus et les abonnés qui proviennent de la radiodiffusion.

4779   A ce moment-là, si l'on permet une plus grande concurrence au niveau des télécommunications pour obtenir des services plus innovants à des compagnies qui pourraient fournir également des services qui seraient différents, comme IPTV, qui, à ce moment-là, permettrait également d'avoir des moyens de radiodiffusion, on permettrait d'avoir de nouvelles façons de concurrencer les grandes entreprises qui ont la mainmise sur à la fois la radiodiffusion et sur les télécommunications.

4780   LE PRÉSIDENT : Notamment, vous croyez que si on avait plus de concurrence, on aurait plus d'infrastructures?

4781   M. HÉMOND : On peut investir de telle façon à ce qu'on améliore les infrastructures, par exemple, avec la séparation fonctionnelle, en permettant aux entreprises d'avoir accès au réseau lui-même.

4782   LE PRÉSIDENT : O.K.

4783   Professor Coates, in paragraph 28 you mentioned all sorts of -- you say that should be clear measurement-based evidence for congestion and you then elaborate three different categories.

4784   Is that kind of data available right now?

4785   MR. COATES: I haven't seen this type of data being publicly available.

4786   THE CHAIRPERSON: But is it collectable, do the Companies collect it or is it economically unfeasible to collect it? I hear that you would like to see this data. What I am trying to see is do we actually know that somebody collects it, it makes sense to collect it or no? Because it strikes me it is going to be very granular, what you are suggesting here.

4787   MR. COATES: It is certainly collectable. It is definitely more expensive to collect than the utilization data which is made publicly available usually. But the devices do exist where you can do measurement studies to collect this type of data. Whether the Companies do it or not, I am not --

4788   THE CHAIRPERSON: We will find out. I will ask them.

4789   MR. COATES: Yes, they may well do it.

4790   THE CHAIRPERSON: And the Shallow Packet Inspection, you are the first person who mentions Shallow Packet Inspection. Is this being practised right now by anyone?

4791   I understood that for control flow management and congestion management actually everybody uses Deep Packet Inspection. You are suggesting in paragraph 31 that there are some problems with Deep Packet Inspection and suggest that they should resort to Shallow Packet Inspection.

4792   To your knowledge, is that being employed right now by people successfully?

4793   MR. COATES: To my knowledge, in practice, I am not aware that anyone is using it exclusively.

4794   THE CHAIRPERSON: Yes.

4795   MR. COATES: As far as I know, it is built in, to some extent, to the Deep Packet Inspection, some of the Deep Packet Inspection devices, in that when they encounter encrypted flows they have to do something beyond signature-based methods and there, there are what you would label Shallow Packet Inspection, looking at the statistical features of the flows instead of signatures embedded in the payload.

4796   THE CHAIRPERSON: So there is no person you can point to as a model, saying they use Shallow Packet Inspection and they actually manage their network that way?

4797   MR. COATES: I cannot point to a company that has done that.

4798   THE CHAIRPERSON: Right. Okay, thank you.

4799   Tim, you have some questions?

4800   COMMISSIONER DENTON: Yes, thank you very much.

4801   Gentlemen, just to get it clear, I am going to propose to you that these are your recommendations and tell me if you want to contradict or add to them.

4802   First, the basic problem is to increase network capacity; second, there should be no application-specific measures; and three, if all else fails, there needs to be structural separation between the wholesale and retail arms. Is that complete or accurate?

4803   MR. HÉMOND: Yes, it is good. Vous avez mentionné des bons points.

4804   COMMISSIONER DENTON: Okay, thank you.

4805   Next, various ISPs have come before us to say that if there is going to be network control it should be exercised by the retailer of ISP services, not the wholesaler. Do you have any comments on the appropriateness of exercising it either at the retail or the wholesale end?

4806   M. HÉMOND : Ce n'est pas une opposition à gérer le trafic pour que ce soit au service de détail ou par les grands fournisseurs, le problème étant de s'attaquer à certaines applications et de donner des motifs qui ne se sont pas avérés.

4807   Donc, que des entreprises gèrent le trafic pour améliorer la situation ou éviter tout problème de congestion, oui, à ce moment-là, que ça soit au service de détail ou après, il faut éviter les problèmes, mais là, le problème étant que les raisons données sont loin d'être évidentes.

4808   CONSEILLER DENTON : La dernière phrase, s'il vous plaît?

4809   M. HÉMOND : Les raisons données sont loin d'être évidentes et prouvées.

4810   CONSEILLER DENTON : O.K. Merci.

4811   J'ai des questions, quelques questions détaillées, sur vos soumissions.

4812   A votre paragraphe 67, vous dites que :

"Le Conseil n'impose aux fournisseurs de services Internet aucune obligation d'information, ni aucune obligation de veiller à ce que le service vendu soit pleinement utilisable par le consommateur tel que vendu." (Tel que lu)

4813   Est-ce que des avis provenant des FSI suffiraient pour répondre aux préoccupations concernant les pratiques appropriées de gestion du trafic Internet?

4814   M. HÉMOND : C'est une première étape, avec une amélioration de la concurrence dans les services, pour permettre aux consommateurs, à ce moment-là, de choisir le service qui lui convient et d'aller vers des compagnies qui, à ce moment-là, ne font pas de ralentissement des applications.

4815   Mais cette information est essentielle pour avoir une décision éclairée pour les consommateurs, notamment, également, de savoir quelles sont les vitesses fournies. S'il y a des minimums, s'il y a des applications qui sont, malheureusement ralenties ou autre, à ce moment-là, que le consommateur quitte cette entreprise et aille vers une entreprise qui le satisfasse.

4816   CONSEILLER DENTON : O.K. Merci.

4817   Au paragraphe 79 :

"Les limites d'usage, une inspection approfondie des packets et le surabonnement ne favorisent pas l'innovation." (Tel que lu)

4818   Avez-vous des observations concernant la fourniture de services innovateurs fondés sur la qualité au moyen de pratiques de gestion du trafic Internet?

4819   M. HÉMOND : Je ne comprends pas la fin de la question. C'est-à-dire est-ce que vous voulez améliorer le trafic Internet dans le sens de la gestion du trafic?

4820   CONSEILLER DENTON : Je pense que la question -- I will just switch to English.

4821   I think the question has to do with the question of whether traffic management interferes with innovation.

4822   M. HÉMOND : Oui. Alors, dans les observations aujourd'hui, dans notre présentation, par exemple, les applications peer-to-peer peuvent servir justement à diffuser des contenus de façon beaucoup plus large. Si on les ralentit, on va nuire à cette innovation et à la possibilité d'autres entreprises de fournir des services innovants.

4823   Aux États-Unis, on a l'exemple de la plateforme Hulu, et puis il y a d'autres services comme ça. Si on s'attaque à une application, on va l'empêcher d'avoir des solutions innovantes dans le futur, des services innovants.

4824   Le peer-to-peer peut servir également à envoyer des messages textes. Il peut servir sur le réseau de télécommunications sans fil. Il y a de nombreuses applications possibles. Il sert également dans la recherche scientifique. C'est véritablement une solution comme une autre, mais si on s'attaque à elle, on va brider l'innovation et la possibilité de voir de nouveaux services émerger.

4825   CONSEILLER DENTON : Enfin, serait-il vrai de dire que votre position, c'est que le problème de gestion du trafic Internet est créé par un manque suffisant de concurrence économique au niveau des réseaux?

4826   M. HÉMOND : Notamment, oui. Effectivement, et, en plus, accentuer par le fait que les mêmes entreprises qui détiennent les services de télécommunication, la plupart des revenus de fourniture de services Internet, sont également les entreprises qui ont énormément d'intérêt dans tout ce qui est la radiodiffusion, entreprises de câble et entreprises de satellite. Donc là, il y a des intérêts qui peuvent être conflictuels.

4827   CONSEILLER DENTON : Merci. Un instant.

--- Pause

4828   COMMISSIONER DENTON: Professor Coates, is there anything you would like to add for your final take-away message that you would like to leave us? I find it useful to let people give us a message if you want to give it. So now is your time.

4829   MR. COATES: My message would be that I think there really needs to be some clear measurement studies that establish exactly what is going on inside the networks and maybe this data does exist. I haven't seen it being publicly available.

4830   There needs to be a better understanding of what are the root causes of the congestion and whether the congestion is causing problems in the networks and I think the investigation of the efficacy of Shallow Packet Inspection is something worth exploring because it would indeed eliminate any of these privacy concerns and stop driving peer-to-peer applications towards adopting means to counter the Deep Packet Inspection that is going on.

4831   COMMISSIONER DENTON: I haven't had the opportunity to look at Professor Odlyzko's MINTS studies. Are they of any use to you in terms of getting at the data you are looking for?

4832   MR. COATES: The studies there are very much utilization and usage based. So, they're really looking at how traffic in general is growing. It's collected at very cost volumes.

4833   It is not looking at how specific applications are interacting with each other, what delays are being experienced, whether time sensitive traffic is actually being jeopardized by large volumes of peer-to-peer traffic or whether streaming video traffic is starting to take over.

4834   This sort of data doesn't really seem to exist because in order to get it you really need to draw down to a link on an ISP and then, of course, there are all sorts of concerns with confidentiality of the data and whether it's a commercial sensitivity.

4835   COMMISSIONER DENTON: Okay. Thank you, Mr. Chairman. Those are my questions.

4836   THE CHAIRMAN: Suzanne?

4837   CONSEILLÈRE LAMARRE: Merci, monsieur le président. Bonjour, monsieur.

4838   J'ai quelques questions très ciblées suite aux réponses que vous avez données au président et au conseiller Denton. Alors, ne soyez pas surpris s'il ne semble pas y avoir de suite logique entre mes différentes questions, c'est parce que le reste est clair.

4839   La première a trait à une affirmation que vous avez faite dans votre présentation au paragraphe 22. Bon, vous avez mentionné, là, que les compagnies viendront par la suite arguer qu'elles ne peuvent investir pour augmenter la capacité des réseaux.

4840   Et, par la suite, et c'est effectivement... on a effectivement entendu un argument à l'effet, de la part des compagnies, que inverser dans les réseaux, bon, c'est coûteux, ça prend du temps et ce n'est pas nécessairement la seule solution.

4841   Et, en comparaison, vous nous citez des exemples en France et aux États-Unis et vous n'êtes pas les premiers, là, à citer des exemples qui viennent de l'extérieur.

4842   Mais à chaque fois qu'on voit de tels exemples, il y a toujours pas deux erreurs, mais deux fautes dans ces exemples-là qui nous sont fournis et que, moi, j'estime sont les suivantes et que j'aimerais que vous adressiez si c'était possible.

4843   C'est que, d'une part, évidemment, on nous donne toujours des exemples d'États dont les territoires sont beaucoup moins étendus que le territoire canadien et, d'autre part, ce sont aussi des territoires qui sont beaucoup plus densément peuplés que le Canada.

4844   Alors, est-ce qu'il n'y aurait pas quand même des particularités pour les compagnies canadiennes ici quand vient le temps, justement, d'investir dans le déploiement d'infrastructure?

4845   M. HEMOND: Je vais vous répondre, si l'on regarde d'autres chiffres, notamment la densité des populations urbaines, il est beaucoup plus facile d'investir dans des zones où on va avoir beaucoup de clients et aussi, on regarde par rapport à d'autres pays qui pourraient nous servir de référence, notamment les pays scandinaves.

4846   On voit que ces pays ont investi massivement dans les nouvelles technologies et arrivent à connecter leurs populations avec des faibles taux de densités également à l'échelle de leur pays parce qu'elles sont concentrées dans des milieux urbains.

4847   Donc, il est possible pour les compagnies d'investir au niveau des grandes agglomérations pour pouvoir permettre de fournir des services de nouvelles générations dans les réseaux et si vous voulez comparer à des pays, effectivement, on pourrait comparer à la Suède, notamment, qui est disposée dans les chiffres de l'OCDE, étant des pays notamment leaders.

4848   Donc, effectivement, les comparaisons pourraient être là si vous le souhaitez.

4849   CONSEILLÈRE LAMARRE: Oui, mais encore là, la comparaison demeure dans un sens ou l'autre; c'est-à-dire, par exemple, dans le cas de la Suède, oui, c'est un pays... ou même la Norvège, c'est un pays qui n'est pas densément peuplé, mais dont l'espace n'est pas densément peuplé et beaucoup plus réduit par rapport à celui au Canada.

4850   Et quand on parle de zone urbaine, oui, tout le monde va s'entendre que, effectivement, c'est plus facile en zone urbaine, mais il faut qu'on se préoccupe aussi de l'accès pour tous les Canadiens.

4851   M. HEMOND: Oui. Alors, on peut également regarder le plan en Australie qui a été déposé récemment avec une densité de population également très faible et qui pourrait se comparer assez au Canada et leur plan vise à fournir d'ici trois ans des vitesses de connexion pour les nouveaux réseaux de 100 mégabites par seconde pour 90 pour cent de la population et, effectivement, en zone éloignée on serait à 10 mégabites par seconde.

4852   Donc, si on veut comparer, voilà, ce serait un bon exemple.

4853   CONSEILLÈRE LAMARRE: Donc, malgré le fait qu'il n'y a aucun autre territoire qui se compare à celui du Canada avec le taux de population qui s'y trouve, ce que vous me présentez c'est qu'il y a quand même moyen de s'inspirer d'autres exemples qui sont peut-être un peu plus ciblés mais qui peuvent, dans certaines circonstances s'appliquer?

4854   M. HEMOND: Il y a toujours des solutions à tous les problèmes et il faut savoir comment s'attaquer au problème, analyser les causes du problème et y remédier. Et, là, il y a des possibilités, effectivement, de trouver des solutions et de s'inspirer de ce qui se fait à l'étranger pour que le Canada retrouve une place de leader dans les communications et les télécommunications.

4855   COMMISSIONER LAMARRE: Mr. Coates, staying with the presentation, starting from paragraph 31 and moving on, when you talk about shallow inspection, I want to make sure I understood correctly the answer you gave to our chairman here.

4856   I would like to understand that shallow inspection is actually the first step in deep packet inspection and what you are proposing is that the ISPs stay with that level of inspection?

4857   MR. COATES: And so, I think shallow packet inspection is actually the second step in deep packet inspection.

4858   You can definitely do much more detailed and it certainly must be said, more reliable classification if you see as deterministic signature in the packet payload, this is exactly a bit term packet because I see the sequence of bites.

4859   Then, if you happen to encounter encrypted payload so that you really can't tell, based on the bites inside what's going on, then you may resort to statistical features of how many packets are arriving, which directions are they travelling and how large are the packets.

4860   These are all things you don't need to look at the actual bites inside the payload.

4861   So, as a secondary measure inside the devices, shallow packet inspection is employed and I guess my suggestion is that based on the measurement studies that have been done over five years more in the academic world, it seems that shallow packet inspection is very effective. You're getting over 95 per cent accuracy classification of flows without resorting to looking inside the packets.

4862   So, it hasn't been used commercially as far as I am aware, beyond this secondary measure inside deep packet inspection devices.

4863   CONSEILLÈRE LAMARRE: Au niveau de votre présentation de votre soumission initiale, monsieur Hemond, aux paragraphes 48 et suivants, en réponse, là, à une question du Conseil sur la possibilité d'utiliser comme méthode des surcharges relatives à l'utilisation excédentaire de la vente passante, là, vous en avez parlé brièvement dans votre présentation.

4864   Mais dans votre soumission, quand je la lis, ça me donne l'impression que vous faites l'apologie d'un format unique pour tous et je comprends, là, le bénéfice que ça peut avoir, mais en même temps, je reste aussi sous l'impression que ça peut créer un autre type d'iniquité pour les consommateurs, et je vous explique, là, ce à quoi je pense.

4865   C'est qu'à partir du moment où on a un format unique ou des frais uniques d'abonnements mensuels, peu importe l'utilisation qu'on en fait, mais les frais uniques sont basés sur une moyenne. Dans la moyenne, il y a des gens qui utilisent moins, il y a des gens qui utilisent plus, il y a des gens qui utilisent de façon abusive.

4866   Donc, les gens qui utilisent moins, étant donné qu'ils paient la même moyenne que tout le monde, se trouvent à subventionner de façon indirecte les gens qui utilisent plus ou les gens qui utilisent de façon abusive.

4867   Et parmi ces gens-là qui utilisent moins que la moyenne, il y en a qui ont des revenus plus élevés, mais il y en a qui ont des revenus moins élevés et qui se trouvent à subventionner, parfois, des gens qui utilisent de façon excessive ou de façon plus grande et qui, eux, ont des revenus plus élevés.

4868   Alors, comment est-ce qu'on fait pour se sortir de ce dilemme-là parce que, oui, un format pour tous, c'est bien, ça permet d'avoir des fois un service abordable, mais en même temps ce n'est pas nécessairement équitable au niveau de l'utilisation.

4869   M. HEMOND: C'est vrai pour d'autres services, notamment les services de Santé. On pourrait également faire la comparaison en disant qu'il y en a qui utilisent plus les services de santé que d'autres. On dit, c'est...

4870   CONSEILLÈRE LAMARRE: On peut faire aussi la comparaison avec d'autres services de télécommunications. Par exemple, le service de téléphonie interurbain pour lequel on...

4871   M. HEMOND: Évidemment. Vous pouvez penser au local aussi.

4872   CONSEILLÈRE LAMARRE: Au local aussi?

4873   M. HEMOND: Oui, mais vous payez... pour le local, vous payez un mensuel et puis, ensuite, c'est limité au local. Pourtant, il y a des gens qui pourraient passer du temps à téléphoner pendant toute la journée au local et puis ils bloqueraient d'autres personnes qui téléphoneraient.

4874   Vous savez très bien que le réseau de télécommunications du téléphone est identique, si on peut faire une analogie à celui de l'internet. Si toutes les personnes venaient à téléphoner en même temps, les lignes seraient saturées et bloquées. Donc, il y a des personnes qui peuvent payer localement leur abonnement de téléphone et passer toute la journée au téléphone et voilà...

4875   CONSEILLÈRE LAMARRE: Mais, là, si on transpose cette comparaison-là à l'international, c'est partout comme ça. Au Canada, c'est... en Amérique du nord c'est relativement unique, là.

4876   Mais là où je veux en venir, c'est que vient un moment où il faut aller chercher une équité à un moment donné où, peut-être, il faut qu'il y ait une question d'utilisateur-payeur. Et je pense que le service de Santé n'est pas une bonne comparaison parce que c'est un problème qui est quand même assez différent.

4877   Mais si on peut rester dans le même registre, on a tous un droit constitutionnel à la libre circulation au Canada, ça ne veut pas dire qu'on peut tous embarquer dans un avion d'Air Canada en affaires quand on le veut.

4878   M. HEMOND: Non, évidemment, bien sûr, mais là on parle... il faudrait concevoir le service internet comme un service essentiel et voir à ce peut-être que le système de tarification par personne et usager n'est pas un système adéquat.

4879   CONSEILLÈRE LAMARRE: Je vous remercie.

4880   M. HEMOND: Merci.

4881   CONSEILLÈRE LAMARRE: Ce sont toutes mes questions.

4882   LE PRÉSIDENT: O.k. Merci beaucoup. Ce sont toutes nos questions.

4883   Madame la secrétaire, on va continuer directement avec Rogers, s'il vous plaît.

4884   LA SECRÉTAIRE: D'accord, monsieur le président.

4885   I would now invite Rogers Communications Inc. to advance to the presentation table.

--- Pause

4886   THE CHAIRMAN: Okay. We will take a five-minute break.

--- Suspension à 0935

--- Reprise à 0940

4887   THE CHAIRPERSON: Commençons.

4888   THE SECRETARY: Merci, Monsieur le Président.

4889   Appearing for Rogers is Mr. Ken Engelhart.

4890   Please introduce your colleagues and then proceed with your 15 minute presentation.

PRÉSENTATION

4891   MR. ENGELHART: Thank you.

4892   Good morning, Mr. Chairman and Commissioners. My name is Ken Engelhart, Senior Vice President Regulatory. To my right are Mike Lee, Chief Strategy Officer, and Pam Dinsmore, Vice President Regulatory.

4893   To my left is Dermot O'Carroll, Senior Vice President Network Engineering and Operations; and Upinder Saini, Vice President Wireless Product Development. Behind me are Alexander Adeyinka, Vice President Regulatory Law And Policy; and Ken Thompson, Director and Counsel Copyright and Broadband Law.

4894   Rogers welcomes this opportunity to discuss the Internet traffic management practices of Internet service providers in Canada.

4895   As the Commission is aware, Rogers is a diversified Canadian communications and media company engaged in a variety of businesses, including high-speed Internet access, wireless, cable television and radio and TV broadcasting.

4896   Mike...?

4897   MR. LEE: Thanks, Ken.

4898   Over the past 15 years, the impact of the Internet has been phenomenal. Almost every aspect of our way of life has been transformed by the Internet. Indeed, growth in Internet traffic has been and continues to be astounding.

4899   Broadband is a huge success story in Canada. Rogers was a world leader in offering a residential broadband Internet service in 1995. Since then, we have invested billions of dollars in our networks to drive continuous innovation and leadership in this industry. Today virtually all of our cable television customers have access to broadband and our 3G rocket sticks have brought wireless access to broadband for 75 percent of the Canadian public, a percentage that grows each day.

4900   When we launched in 1995, our 1.5 Mb per second service sold for $60. Today our 10 meg service sells for $46.95. That is a seven times improvement in speed at a much lower price. Usage of our network grows dramatically each year.

4901   Canada has the highest penetration of cable modem service in the world and the highest penetration of broadband in the G8 countries. All of this has been accomplished with the minimum of government regulation. Market forces, not government fiat, are responsible for Canada's remarkable success.

4902   Many of the participants in this proceedings, perhaps with good intentions, want to change that. They want lawyers, not engineers, to design the networks. This would be a big mistake.

4903   Rogers is committed to an open Internet. We do not block packets, encrypted packets or re-PMs, nor do we manage our networks to favour our cable television business, demand fees from Internet services for access by our subscribers, or stop independent documentary filmmakers from distributing their content. We do not open up e-mail and read it, inspect the contents of packets or focus on specific packets.

4904   What we do do is provide a reliable, fast, affordable Internet network for our customers and manage our service to allow us to do that.

4905   In Schedule 2 of the Commission's letter of June 5, 2009, the Commission stated that it approaches this hearing with the following objective in mind:

"... to establish Internet traffic management practices guidelines that maximize the freedom of Canadians to create applications and use the Internet or respecting the legitimate interests of ISPs to manage their networks consistently with privacy and other legislative constraints." (As read)

4906   Rogers would urge the Commission not to set Internet traffic management guidelines at this time. The FCC has explicitly rejected this approach in the Comcast decision. It stated:

"We decline to adopt prophylactic rules at this time because confining our holdings to a particular set of facts should provide guidance to consumers and the industry without unduly tying our hands should the known facts change." (As read)

4907   The FCC's approach is sound. The Internet is too new and is changing too quickly to establish ITMP guidelines at this time. It is better to adopt the FCC's approach of looking at individual Internet traffic management practices on a case-by-case basis. In that way, the Commission will ensure that Canadian ISPs have the flexibility they need to manage their networks properly.

4908   Sections 27(2) and 36 of the Act give the Commission the power it needs to control traffic management. No guidelines are needed to interpret these sections. Nonetheless, Rogers will respond to the Commission's questions in Schedule 2.

4909   Dermot...?

4910   MR. O'CARROLL: Thank you.

4911   The rate of change in the Internet environment is increasing, therefore, Internet traffic management practices must be highly dynamic and responsive to these changes. Static regulatory guidelines will have unintentional consequences for the performance of the network and the experience enjoyed by our customers.

4912   To assist the Commission, we will briefly describe our traffic management processes for our wireline network. Listening to the intervenors, one would think that the only traffic management practices Rogers engage in involves traffic shaping.

4913   In fact, we do much more to protect our customers experience. We protect the network from spam, prevent denial-of-service attacks and virus attacks and block access to child pornography sites.

4914   Some intervenors have alleged that we do not invest in network augmentation. Nothing could be further from the truth. We spend tens of millions of dollars each year just to augment capacity for existing customers. We also spend tens of millions of dollars annually for new customers and to add new features and functionality to the network. We are able to keep up with the escalating growth in downstream traffic through these substantial expenditures.

4915   Rogers does rate shape or traffic shape upstream peer-to-peer traffic. Peer-to-peer filesharing applications, as the name suggests, involves the sharing of files. Accordingly, if an Internet user, likely on another network and quite possibly in another country, is trying to download a file, they can source those files from our customers computers on the Rogers network.

4916   Unlike most of our customers' use of the Internet service, the uploading of peer-to-peer files is an automated machine-to-machine transfer. Our customers may not even be at home or even in the country when their computer is used as a source of files. Furthermore, this automated machine-to-machine transfer takes place 24 hours a day seven days a week at the maximum rate of speed that the customer's service permits.

4917   The use of our network for constant 24/7 machine-to-machine traffic puts a strain on our network that, as a consumer grade Internet service, it is not intended to support. Think of our network as a highway with many lanes shared by many more cars. If one car ties up a whole lane 24 hours a day, it creates a problem for the other cars. That is exactly what peer-to-peer filesharing applications do and that is why we must manage this traffic. All other traffic on the network can use the entire upstream pipe.

4918   Let me be clear, we do not care whether the applications are peer-to-peer file sharing or any other application, it is the 24/7 maximum use of the network that creates problems. We would manage any other traffic with these characteristics the exact same way. We are not concerned with the nature of the content or whether it is legal or not. This protocol is designed to swamp the network and that is why it must be managed.

4919   A few intervenors claim that we could avoid this form of traffic management solely by interesting capacity on a network. If we did this, we would need to provision a huge amount of additional upstream capacity. This would significantly increase the cost of the service which would be reflected in the price for all customers, not just peer-to-peer users, which represent a small subset of our customers.

4920   This cost-benefit trade-off does not make sense. Our practices have nothing to do with protecting our cable television businesses. Many corporate and educational networks, as well as ISPs such as Primus and Barrett that are obviously not video distributors, do the same thing.

4921   Our practices do not favour our own services. In fact, without our traffic management practices competitive voice over IP providers would be negatively impacted by network congestion. From this description, we believe it is readily apparent that our traffic management practices are an appropriate network management solution.

4922   Pam...?

4923   MS DINSMORE: We will now turn to the five issues the Commission identified as ancillary to the central traffic management question. They are: disclosure, privacy, wholesale services, mobile carriers and the scope of section 36.

4924   With regard to greater disclosure by ISPs, something some interveners have suggested, we at Rogers have found that our customers have very little curiosity about the inner workings of our traffic management practices. Our customers want a fast, reliable service; how we delivered it is something they rarely inquire about. Nonetheless, Rogers provides our customers with disclosure of our traffic management practices on our website.

4925   For wholesale customers, we believe that there should be sufficient disclosure to allow them to understand the nature of the services they are acquiring and to respond to their own customers inquiries appropriately. However, if the Commission wishes to satisfy itself that our management practices are appropriate, we have no difficulty in providing details of this information to the Commission in confidence.

4926   Rogers traffic management procedures never involve the collection, use or disclosure of personal information. We do not open e-mails or look at message content. We do not store personal information about our customers, nor do we monitor their Internet search activity or URL browser history. We do not store content accessed by our users or cache any content whatsoever.

4927   We are extremely sensitive to our customers' privacy concerns and work hard to protect them. Many of the privacy issues raised by intervenors concern things they fear ISPs could do or might be able to do such as behavioural advertising. With respect, we submit that the Commission should look at what we are doing, which is simply separating packets into two streams to create a better overall customer experience.

4928   Rogers wholesale services are not currently traffic shaped. If wholesale traffic begins to impact our other customers' traffic, we will revisit this decision.

4929   Upinder...?

4930   MR. SAINI: Thank you, Pam.

4931   THE SECRETARY: Your microphone, please.

4932   MR. SAINI: Sorry. Rogers wireless does not currently rate shape our mobile wireless data traffic, however, the user of wireless data services is increasing dramatically. With the use of our Rogers rocket sticks people are beginning to use the mobile wireless Internet services in the same fashion as they use our high-speed Internet wireline services. Therefore, we believe that the customers will be increasingly using peer-to-peer filesharing applications or similar applications. Accordingly, traffic management will be necessary in the future.

4933   Given that the wireless network is different than the wireline network, it may well be that the traffic management practices will be different; costs are different, architecture is different, resources are scarce and the customers are mobile. It is too early to identify traffic management practices that will be required for mobile wireless carriers.

4934   Ken...?

4935   MR. ENGELHART: Finally, we want to say a few words about section 36 of the Telecommunications Act. It states:

"Except where the Commission approves otherwise, a Canadian carrier shall not control the content or influence the meaning or purpose of the telecommunications carried by it for the public." (As read)

4936   Rogers traffic management practices do not control the content of peer-to-peer filesharing traffic. A peer-to-peer user, likely on another network, may take four or five hours to download a movie using a peer-to-peer file sharing application. Rogers traffic management practice may mean that it takes longer for this download to take place. This does not control the content or change the meaning or purpose of the movie. The movie remains exactly the same with or without Rogers traffic management practices.

4937   Mr. Chairman, Commissioners, we have heard many arguments in this proceeding about law, philosophy, the Oakes test, the nature of the common carrier obligations and the hypothetical concerns of various vested interest groups. We have heard very little about customers or their experience on the network.

4938   We are proud of the service we deliver. It is fast and reliable and when we survey our customers they value it highly. We hope you allow us to evolve and to respond to the dynamic changes in the online world. We urge you to focus on the customer and conduct your deliberations to ensure that Canadians continue to receive a fast, reliable and affordable broadband service.

4939   We are pleased to answer any questions which the Commission may have.

4940   THE CHAIRPERSON: Thank you for your intervention.

4941   First of all, on page 3 you quote the FCC in saying it should not adopt rules. We are not proposing to adopt rules, but guidelines. So that compels -- rules and guidelines are something different, which I expected you, Mr. Engelhart, as a lawyer, to appreciate.

4942   Secondly, what we are really talking about is an analytical framework, an approach here, and assume we follow the advice, as you say, and do it case-by-case, wouldn't it be helpful to the industry and everybody if we, as a result of this, laid out an analytical framework and said we have section 27(2) here, we have section 36, when we get a complaint which is based on ITMP this is the approach you would go through first of all to determine whether it is valid or not and, if it is on the face of it invalid what are the exculpatories and use an Oakes test or something like that.

4943   Wouldn't that be helpful to you?

4944   You seem to suggest don't touch it.

4945   MR. ENGELHART: I mean a couple of points.

4946   First of all, I have had the privilege of appearing before the Commission for 23 years and I have seen a lot of proceedings where the Commission has interpreted 27(2) and 36 and other sections of the Act without guidelines. They have done just fine without guidelines in most of the areas that I have been familiar with and where there have been guidelines, for something like the essential facilities test, that came after really decades of experience with wrestling with similar sorts of problems.

4947   The second point is, I am a bit concerned that some of the guidelines that have been put forward by some of the interveners like the Oakes test seemed to have a kind of a bias against network management. They are saying you better really, really, really prove your case before you can do network management. I think that's sort of dangerous.

4948   But I anticipated your concern about our lack of faith in guidelines and I have been giving it some thought and I think if you were going to have the analytical framework that you talked about, consistent with our message in our opening remarks, it should really focus on the customer. You should focus on what it is that the customer experience is. Sometimes that is going to involve you making a trade-off between a small group of customers and a larger group of customers, but I think those are the sorts of trade-offs that telecommunications regulators make all the time.

4949   The second element I would add to an analytical framework is you shouldn't assume that what we are doing is trying to upset our customers. You know, most carriers are trying to win customers from the other guys and try and keep the customers they have happy. So you should assume -- or you should have a presumption that network management practices are for the benefit of customers.

4950   I guess the third thing I would say -- and I don't know if this adds up to guidelines -- but look at what other people are doing, look at what other ISPs are doing, look at what other educational and corporate networks do. If they are doing the same sorts of things that's useful as well.

4951   THE CHAIRPERSON: It seems to me you are saying a qualified may be useful, especially for others who haven't spent 26 years appearing before us.

4952   But the analytical framework, if you think what the others suggested is biassed and sort of assumes automatically that ITMPs are harmful or overly heavy and overly analytical, I would urge you to put forward your own analytical framework, saying, you know, it would be helpful if the CRTC would approach these issues in the following -- these other steps to go through.

4953   Secondly, I'm glad you brought Mr. Lee with you because there are some technical issues that people keep raising and I never know, none of us is -- at least most of us don't have the technical knowledge.

4954   This morning for instance we heard two things, we heard deep shallow and we heard P4P and suggested both deep shallow inspection could be used, you don't need to resort to deep packet inspection and P4P is a new technology which I will alleviate some of the concern of P2P.

4955   As the reigning expert on this, Mr. Lee, maybe you can enlighten me as to how useful these things are?

4956   MR. LEE: Sure. Happy to try to answer.

4957   So in listening to the description this morning, there was a differentiation between deep packet inspection and shallow packet inspection, to start with that question.

4958   On the shallow packet inspection I think the way the professor described it was that you first start with the first level, which is deterministic, so you specifically look at the packets and determine whether or not they are of that type; and then the second, which she called shallow, which is the second level, you actually look at the behaviour or pattern of the packets and the statistics around how they behave on the network to classify them.

4959   If you look at the way we do traffic management today, we use a combination of both techniques.

4960   So in the case where the packets themselves, or the applications generating the packets, are not trying to obscure what the source of the packet is or what type of packet it is, then the use it deterministic, because that is a simpler way and a more accurate way. And then, for those packets which are designed to obscure their source, we use what we call heuristics or what he referenced as statistical analysis and we look at the behaviour.

4961   So if a packet stream is, you know, 64 kb per second, one source, one destination, chances are that's probably a voice -- that's probably a voice session. If it has different characteristics that look and behave more like peer-to-peer protocols do, then they classify it as peer-to-peer protocols.

4962   We try to be very conservative in the way we use the heuristic sort of approach, so that we don't capture, in an unintended way, packets that may not be of that nature.

4963   So we definitely -- what we always do is, we test all of those classifiers that are analyzed in the traffic heuristically, and ensure that only those packets which are definitely peer-to-peer are actually classified as peer-to-peer, and then routed into the separate allocation.

4964   THE CHAIRPERSON: But the statement this morning says: Experimental studies have shown that this classification -- shallow packet inspection -- can be very accurate, but the classes must be more general. Shallow inspection is a viable alternative to deep packet inspection.

4965   Do you subscribe to that or not?

4966   MR. LEE: In our experience, we have not seen the rates of accuracy that the professor described, 95 percent, we have seen much lower levels of accuracy.

4967   Having said that, we try, in the approach we take, to ensure that we don't capture any false negatives in the process. So those packets which may be in question, which may look like they may belong to peer-to-peer protocol, but we are not absolutely certain of, we let them pass unimpeded.

4968   THE CHAIRPERSON: And P4P?

4969   MR. LEE: P4P is a working group. We actually have spent time looking at it and participate in P4P through our cable lab's activities.

4970   The challenge with all of these working groups which try to come up with -- I will call them more network sensitive or network aware ways of dealing with peer-to-peer traffic, is that they rely on the participants to actually adhere to the guidelines.

4971   So if you are a more legitimate user of peer-to-peer protocols, you can basically sign up to working with P4P and adhere to the guidelines, which are still in development at this point. But for those people who decide not to adhere to those guidelines, they continue to basically use peer-to-peer the same way they did before the guidelines were established.

4972   So it's a little bit voluntary. It is very similar to things like MPLS and Div serve, where it does rely on everybody being a good actor, and, in the internet, not everybody is a good actor.

4973   So they are good activities in principle, and we continue to monitor those activities, hoping that they produce some positive results, but I don't expect that, even if they do provide positive results, it will be a solution to the way peer-to-peer basically swamps the network today.

4974   THE CHAIRPERSON: And you, like Cogeco, mentioned that you only shape upstream traffic.

4975   I just don't know -- and you probably don't even know the answer to this -- the people who upstream from -- your users, are they mostly people who are your own customers who download, or is it totally unpredictable who will do what?

4976   The point of my question, obviously, is, by shaping the upstream, do you also shape the downloading of your customers, or influence the downloading of your customers?

4977   MR. ENGELHART: Obviously, it is going to happen sometimes, but it's interesting, after you asked Cogeco that question, my colleague, Mr. O'Carroll, went back to his lab on Friday afternoon and did a little experiment, so I will ask him to describe that to you.

4978   MR. O'CARROLL: Thanks, Ken.

4979   Yes, Commissioner, after I heard you ask that question on Friday, I went back to our office in Toronto and repeated an experiment I had done before, just to verify that I would get the same results.

4980   What I did was turn on a computer that is on our public internet service, connected it to the DOCSIS modem and activated a BitTorrent client on the computer.

4981   The computer has one single video file on the computer, so that is the only file that would be available for uploading by somebody else. I did not do any downloading, I just left the computer sitting there and I watched it.

4982   Within 15 seconds the first upload stream began.

4983   I then left the computer and came back 10 or 15 minutes later to see what was happening. Within that period, there were now 20 consecutive upload streams happening on the computer. There were 20 different customers, somewhere in the world, accessing that computer, and uploading that single video file.

4984   I looked at the characteristics and the source of those uploads, and interestingly -- first of all, none of them were Rogers' customers. In fact, none of them were Canadian. They were the U.S., multiples, Finland, the U.K., Ireland, India, Australia, and multiple other countries, all actively uploading that file, within 15 minutes.

4985   I have done this experiment in the past, and I have seen Canadian customers in the past, not Rogers' customers.

4986   The thing I would draw from that, first of all, is if our network management of the upstream is as oppressive as some people would suggest, I don't know why 20 people would simultaneously be accessing my computer and uploading a file, when there are millions of other computers in the world that they could access.

4987   So I don't think the experience is so bad for them that they would avoid our computer.

4988   Secondly, these are not my customers, and for me to build capacity, to give them an even better experience, would be detrimental to my customer base.

4989   THE CHAIRPERSON: Okay, thank you.

4990   Candice, do you have some questions?

4991   COMMISSIONER MOLNAR: Yes, thank you.

4992   Good morning, everyone.

4993   I would like to start by going back -- you addressed the five issues that the Commission had put out in its procedural letter, and you addressed the objective very clearly, but I wondered about the definition.

4994   We had stated that the definition essentially excluded managed networks. Do you agree with that definition?

4995   MR. ENGELHART: Yes, we do.

4996   COMMISSIONER MOLNAR: So you are content with it as it is defined today?

4997   MR. ENGELHART: Yes, we are.

4998   COMMISSIONER MOLNAR: Thank you.

4999   You spoke in your opening remarks and with the Chair about the notion of guidelines and whether or not there should be a framework or guidelines, and I did hear that you were going to file something from that end.

5000   One of the issues, as I would see it, as to not having guidelines, or doing everything on an ex post basis, is the fact that, if there are any discriminatory practices, and particularly as they relate to traffic management that would be categorized -- MTS used Category 4, where it is specific against content, application or protocols. But if such practices existed, by the time you went through an ex post review of this, you could essentially cause some significant economic damage to that application.

5001   Would you have any comments on that?

5002   MR. ENGELHART: Thank you.

5003   I guess there are two issues. One is the danger of setting out guidelines ahead of time, and the other is the benefit of doing so.

5004   The danger, quite simply, is, this is all so new. The internet is growing so fast, the applications are arriving so quickly, and there is so much going on that there is a danger in trying to set guidelines now, because they could quickly become obsolete, and they could restrict carriers like us from engaging in traffic management practices that benefit customers.

5005   The benefit of having these guidelines -- it all seems to me to come back to the net neutrality issue. People started worrying five years ago, when some U.S. phone company said, "We are going to charge content providers, charge websites, if they want to get through to our network, and if they don't pay us the cheque every month, we are going to block their traffic."

5006   That has spawned this gigantic concern about net neutrality, but it hasn't really happened.

5007   I think there is a huge amount of concern out there, there is a huge amount of fear out there, but there isn't very much evidence that any of this is going on.

5008   The evidence shows that ISPs like us, in order to be competitive, have to offer wide open internet services and give our customers anything and everything they want, in a fast, reliable and affordable way.

5009   I think the benefit of having guidelines is to deal with these net neutrality concerns, which I think have been overblown.

5010   COMMISSIONER MOLNAR: I don't want to take up too much time on this issue, but when you say that there is no evidence, isn't the danger that that evidence means that there is already a failed application or a failed business case?

5011   Unfortunately, the evidence means failure, and that's the problem with doing everything on an ex post basis, the evidence means the failure of an application or some innovations, potentially.

5012   Could I go on to ask you another question related to this?

5013   The OIC put forward in their position that they felt that discrimination against an application or an application provider is discrimination under section 27(2).

5014   Do you have any comments on that?

5015   MR. ENGELHART: I don't think that 27(2) is there to protect applications, I think it is there to protect people or businesses or competitors or customers. I don't think it is there to protect applications, but, presumably, an application provider merits the protection of 27(2).

5016   COMMISSIONER MOLNAR: Okay. Thank you.

5017   I would like to talk a little bit about your internet traffic management practices, and we will start, obviously, with cable, where the peer-to-peer is today throttled.

5018   You have throttled on a 24/7 basis, and I am sure that you have listened in through the past week, and through the record of this proceeding, where there has been some discussion that any traffic management practices should be targeted and should deal with real congestion, that is, where there is true congestion through peak periods or otherwise.

5019   So maybe just help me, because I know that you went through this, as well, speaking of why it makes sense to throttle on a 24/7 basis versus throttling as need exists.

5020   Could you help me and clarify why there is a need 24/7, or why it is better regardless of the need?

5021   MR. ENGELHART: Sure. I will start, and my colleague Dermot will jump in.

5022   It is useful, I think, to think of the analogy of a network to a highway, and to think of the traffic on the network as cars. If you think about it that way, what people are saying is, if there are too many cars, you really should build a bigger highway. You should augment capacity.

5023   And if you are going to manage traffic, you should do it at rush-hour, at 9 in the morning and at 5 at night, when all of the cars come pouring onto the highway.

5024   In our view, this sort of misstates the problem, as we see it.

5025   We are okay with the fact that we have 50 percent more cars each and every year. We keep building a bigger and bigger highway each and every year. It's not easy. It is certainly not as easy as a number of the intervenors have said, and it is certainly expensive, but we are doing it.

5026   The problem is, if a car parks by the side of the road and one car clogs up a whole lane -- or a better analogy to what is going on with peer-to-peer would be, if one house in the neighbourhood reserves an entire lane of the highway for themselves, that is a problem.

5027   That is what peer-to-peer file sharing does for us in the upstream. It is a service that is designed for residential users --

5028   COMMISSIONER MOLNAR: Mr. Engelhart, using your analogy, you have built a super highway to address rush-hour, or help through rush-hour, and somebody has parked their house on the side.

5029   So for 23 hours of the day traffic is still going to get through uninhibited.

5030   So that really causes me to ask the question again: Why are you throttling 24/7 instead of through rush-hour?

5031   MR. ENGELHART: The problem is, it's not just one house, it's a whole bunch of houses in the neighbourhood that are clogging up that neighbourhood 24 hours a day. They are reserving their lane, and that is the problem.

5032   It is the behaviour of someone reserving an entire lane for themselves all the time in the upstream that causes our problem, and...

5033   I am going to go to Dermot very soon.

--- Rires

5034   MR. ENGELHART: If you think about it, the congestion problem that we experience is at the node level, those clusters of 200 or 300 homes. That is where the congestion happens.

5035   But traffic management happens at the router, and that router covers a whole bunch of nodes.

5036   We can't do it node-by-node, and the problem, the congestion, may occur at any given node, at any time of the day.

5037   That's the reason why we do it 24 hours a day.

5038   I would ask Dermot to add some of the details.

5039   MR. O'CARROLL: Thank you, Ken.

5040   As Ken mentioned, our network is architected into relatively small clusters of customers, 200 or 300 customers, and because of that, and because of the nature of peer-to-peer traffic, within a cluster like that, and because peer-to-peer traffic is -- what we manage is machine-to-machine file transfer, which happens 24/7.

5041   So while, on average, the network has a busy hour, or a busy period, within an individual cluster, a relatively small number of peer-to-peer users can exhaust or congest that cluster at any time in the day, and we find that happening.

5042   We have tried to deal with this in a variety of ways. We tried to build our way out of it by adding capacity in the past, and what we found was -- we could have a cluster of customers that was congested. We would augment that cluster, double the capacity, and what we would find is, the following day it would be congested again, because those peer-to-peer users -- their traffic would grow to absorb the available capacity in the network.

5043   The second thing we have done is, we have thought about -- could we do this by time of day or by other periods. We have done tests where we have turned off our peer-to-peer in parts of the network, at different times of the day and night, and what we found was, once we do that, that upstream traffic grows to absorb the capacity, and for that cluster, where it's turned off, at that point in time, even at 3 in the morning, it becomes the busy hour or busy period for that cluster.

5044   And because the traffic is dynamic, we do not believe that we can manage the traffic in such a dynamic way as to manage that customer experience.

5045   I would also like to pass it over to Mike to add more to this.

5046   MR. LEE: When we traditionally think of peak utilization on the network -- in the old telecom days there was always this concept that many people were using the network at a specific time, and that drove the capacity requirement of the network.

5047   That analogy works really well if everybody who is on the network is initiating transactions, but, in this particular case, we don't actually have a peak point in time, we have peak periods, and they are measured in hours.

5048   The insight that the original peer-to-peer developers brought was, they saw that there was this capacity on the network where people had subscribed to the service but were not using the network, and they would be able to take advantage of all of that network capacity.

5049   It is designed, basically, to consume all of the excess resources on the network. So every time you go to do more augmentation, it consumes more, because it is not being consumed by our subscribers, it's being consumed by people outside the network.

5050   COMMISSIONER MOLNAR: Can I ask you a question?

5051   You are network people, so you have traffic information that confirms that P2P runs at full capacity 24/7.

5052   Is that true?

5053   I think that's what I am hearing you say, that there isn't a peak period. Whether it is minutes, hours, or whatever, there is no peak period with P2P, it runs at full capacity. Do you have traffic statistics to support that?

5054   You don't have to share them here, but you have them?

5055   MR. ENGELHART: Yes, for the upstream.

5056   Sometimes customers will turn it off. You know, when kids are doing gaming, they know that they will be able to shoot the other guy faster if they turn their peer-to-peer off. But if they haven't turned it off, it runs 24/7, at full capacity, on the upstream.

5057   COMMISSIONER MOLNAR: Okay. And when I said that you don't have to share it here, I think it would be good to share it as part of the record of this proceeding, because there are other providers, as you know, who also take action against peer-to-peer through peak periods, or through what they have defined as a peak period.

5058   The fact that you say there is no peak period, while there are other providers working in the same market who have defined a peak period for peer-to-peer, is a little bit confusing.

5059   MR. ENGELHART: Certainly, we can give you that.

5060   I think that there is a difference, as the Sandvine people said, between DSL and cable modems, because they have a bigger upstream pipe than we do.

5061   COMMISSIONER MOLNAR: But you were talking about the nature of the traffic. Correct?

5062   MR. ENGELHART: Right. But if they have a way bigger pipe, they may be able to not shape at certain times of the day. That's what I suspect is the difference.

5063   But, yes, we can give you that evidence.

5064   COMMISSIONER MOLNAR: And it is the size --

5065   I am going to ask this as a question. Is it the size of your upstream bandwidth, the size of your upstream pipe, that has caused you to determine that it is only necessary to throttle on the upstream?

5066   What is the rationale for throttling only on the upstream and not both upstream and downstream?

5067   MR. ENGELHART: I will ask Mike if he wants to jump in, but on the downstream -- certainly some customers are downloading huge files a lot, but we think that we can control that through augmentation, and we can control that through pricing.

5068   We have introduced bandwidth caps at 60 gigabytes for our express service, and at 95 for our extreme service, and that has diminished somewhat the excess downloading of very heavy users.

5069   So we can control it that way on the downstream.

5070   On the upstream, because we are constrained as a cable modem network, and because of that 24/7 maximum automatic usage of the service, it can't be controlled.

5071   In other words, we can manage it to deal with our customers' requests, downloads, experiences, but on the upstream it is the rest of the world that is using the network, not our customers, and it's hard for us to manage that.

5072   Mike...

5073   MR. LEE: I would just emphasize Ken's last point, which is, on the downstream it's a person or a household that is driving all of the requests, so there is a limit to what one person or household can do.

5074   When you were talking about the upstream, it is everybody else who potentially could be driving traffic.

5075   So when you put the aggregate in place, that is all demanding on the upstream, that does have a significant impact, but it is related to the nature of the fact that the cable network has a more limited upstream resource.

5076   COMMISSIONER MOLNAR: Okay. I would like to move on.

5077   In your comments that you filed in January --

--- Pause

5078   COMDMISSIONER MOLNAR: I'm sorry; I am trying to find your initial comments.

5079   I have written it down here, so I am going to have to ask you to take it on faith.

5080   You commented that the Comcast agnostic approach would be more expensive and cause more problems than the approach that is in place today in targeting just the peer-to-peer.

5081   Could you explain to us what sorts of costs and what problems you are referring to?

5082   MR. ENGELHART: Sure. Again, my colleagues might want to jump in.

5083   You can think of the upstream as being used for two things: things our customers send, and things that people in the rest of the world are sourcing from their computers.

5084   When they source things from our customers' computers, that is peer-to-peer file sharing. Things that our customers send might be an e-mail, or making a VoIP call, or using Slingbox to send a TV program or send a bunch of photos to your brother, things like that.

5085   Our methodology restricts the band width for people and the rest of the world sourcing things from our customers' computers.

5086   The Comcast methodology restricts all applications.

5087   So, we would -- if we move to the Comcast methodology, we would be having to say to our customers at some point, I'm sorry, you can't send those photos to your brother. or your VOIP call won't work, or your Slingbox won't work.

5088   And we don't want to do that, we don't want to --

5089   COMMISSIONER MOLNAR: So, the problems are for the customer?

5090   MR. ENGELHART: Yeah.

5091   COMMISSIONER MOLNAR: And the costs are for who?

5092   MR. ENGELHART: Well, if you assume that those problems are going to be there, then we'd have to try and come up with some second best solution to try and facilitate those customers' requirements which might involve more augmentation and that would be more cost.

5093   COMMISSIONER MOLNAR: So, you're able to augment to address upstream capacity limits?

5094   MR. ENGELHART: No. I think the problems are always going to be there, but we would have to try something and it would be more costly than it is today.

5095   COMMISSIONER MOLNAR: Okay.

5096   MR. ENGELHART: And, I mean, we couldn't augment our way out of the problem for sure, but a certain amount of expense would cure some portion of the problems, no question about that.

5097   I don't know, Mike, if you want to add.

5098   COMMISSIONER MOLNAR: I think that's fine. Thank you.

5099   I wanted to understand exactly how you do throttle your peer-to-peer. I was looking at your service packages and I noticed that you have packages that differentiate upstream capacity, upstream speed between your extreme and your express.

5100   So, when you are throttling peer-to-peer, do you throttle it equally for all service packages, or do you throttle it as a percentage of upstream band width, or how is it that you're throttling this peer-to-peer traffic?

5101   MR. ENGELHART: It's the same for all packages, same band width allocation for all of the different packages.

5102   COMMISSIONER MOLNAR: Okay. And I just want to understand what that means, band width allocation. So, are you saying --

5103   MR. ENGELHART: Speed.

5104   COMMISSIONER MOLNAR:  -- the speed of peer-to-peer is reduced equally regardless of whether you've got a one meg upstream --

5105   MR. ENGELHART: Yes.

5106   COMMISSIONER MOLNAR:  -- or not?

5107   MR. ENGELHART: Yes.

5108   COMMISSIONER MOLNAR: Okay. So, that does take me into the issue of disclosure.

5109   You've said that you now disclose, which I think must be quite a recent occurrence because in your reply comments you hadn't been at the point of disclosing to your customers yet.

5110   So, you've just recently, as I understand, put information on your website for your customers related to your throttling practices; is that correct?

5111   MR. ENGELHART: Yes. We've put an FAQ that describes it in a general way, yes.

5112   COMMISSIONER MOLNAR: So, while you say your customers aren't -- and let me see, what are the words that you've used in your comments to us today.

"We at Rogers have found that our customers have very little curiosity about the inner workings of our traffic management practices." (As read)

5113   COMMISSIONER MOLNAR: When they're buying capacity and, I mean, the difference in the upstream band width is a significant price differential and I understand there's greater bit caps or monthly usage caps as well, but the difference in the upstream capacity appears to be quite a significant differentiator between your extreme and express packages.

5114   So, when they buy that. and when I was looking at your website it was saying that if you wanted to share files and so on this is -- you know, extreme is the service for you.

5115   You don't think those customers would be interested in knowing that there is certain amounts of what they're wishing to share that is being throttled?

5116   MR. ENGELHART: Well, some of the peer-to-peer file sharing applications are non-reciprocal. So, Nutella for example, so they can download as much as they want regardless of how much they send upstream.

5117   Some are reciprocal, and for the reciprocal ones it is going to affect their download indirectly. There's a sort of a golden rule applied to the -- some of these applications, like BitTorrent, where they'll slow down your download if you slow down the upload.

5118   So, in that sense, it does have an impact on customers. We do find that most customers are very happy with the service and --

5119   COMMISSIONER MOLNAR: But perhaps, do customers know? I guess that's my question. Mr. Engelhart, you are the one who said when we're creating these guidelines and when we're looking at this we should have the customer in mind.

5120   MR. ENGELHART: M'hmm.

5121   COMMISSIONER MOLNAR: You know, I have in front of me your packages and extreme, it says here:

"...is best suited activity as music, video streaming, downloading and playing games." (As read)

5122   COMMISSIONER MOLNAR: There is nothing that would indicate there's any limitations to that. I mean, that would be the reason potentially for purchasing that product which is $13.00 more than, you know, the other is because of its capacity for the upstream because extreme and express have a similar downstream capacity, the available band width going down is the same, it's the upstream that's differentiated.

5123   So, if we're concerned by the customer, don't we think the customer should have full access to information? I mean, that they're not interested may be that they don't even -- they're not aware of what's going on.

5124   So, now I want to ask you one more question and I'll pass it back to you.

5125   We had some persons in front of us, including Mr. Roks and Mr. Mezei who had come as a panel and said what they think should be done is when advertising speeds that there should be advertised both the throttled and unthrottled speeds.

5126   So, if we are going to advertise speeds, upload speeds or download speeds, we should at the same time, so consumers have full awareness and full disclosure, give to them information on both throttled and unthrottled.

5127   So, tell me your views on that.

5128   MR. ENGELHART: There's another difference between the express and the extreme service and that's the cap. So, with the express service you get 60 GB, with the extreme service you get 95.

5129   So, I think the descriptive material that you're reading there is saying to people, if you download a whole bunch of stuff through video streaming or any other way you probably want the extreme service because now you don't hit that bit cap until you get to 95.

5130   So, I think that's the selling point that the marketing folks are making there.

5131   Your second question is, should we disclose the throttled speed or the reduced band width speed?

5132   We have not to date, we think that it's sort of competitively sensitive information in that it's sort of the bliss point that we found where our customers still get a good download experience, but it allows us to give them also good upload experience.

5133   I mean, if the Commission felt strongly about it, we would reveal that number. We don't think it's that useful to our customers and we do think there's some competitive sensitivity, but it's not something that we're all that upset about if we are forced to.

5134   COMMISSIONER MOLNAR: Thank you.

5135   The notion of it being competitively sensitive leads me to two more questions.

5136   One is, we've had some other ISPs in front of us who say that Internet traffic management should in fact -- competition should address, you know, the issues we have with or concerns about ITMPs and, in fact, ITMPs could be a form of competitive differentiator.

5137   What is your thoughts of ITMPs as a form of differentiator?

5138   MR. ENGELHART: Oh, absolutely. I mean, we have a very competitive market in Canada. There has been a battle between DSL and cable modems from the beginning and joining very quickly I believe will be 3G wireless services that provide the same kind of performance.

5139   And we advertise that we have Canada's fastest, most reliable network and we're rolling out DOCSIS 3.0 next month, Alliant is building fibre to the home in New Brunswick. All the carriers are making huge investments to try and deliver a faster, better, more affordable service and traffic management is part of that.

5140   COMMISSIONER MOLNAR: Okay. Traffic management, that deals with the speed and reliability. If I move to traffic management as it relates to content applications and protocols, do you think it is reasonable that that should or could be a form of differentiating your network?

5141   MR. ENGELHART: Mike?

5142   MR. LEE: If you look at how we're measured by our subscribers, we're measured based on the performance of the network and the primary reason they subscribe to Internet is they want to get access to a wide, wide range of different uses of the network, and that is everything from what a small child would do to a grandmother.

5143   And we have to, taking a look at all the data from our subscribers of what they value, what they're interested in, make our decisions around where we place emphasis and how we engineer the network to deliver the best possible experience across that wide range of applications, not just file sharing or not just gaming.

5144   So, a great example would be, we probably -- you know, there probably is some forms of gaming where it's not an optimal experience on our network because we're not as low latency as some gamers would like, but we have to make that trade-off to say, you know what, I can't afford to invest in low latency for everybody because -- and spread that cost across all of our subscribers.

5145   So, we make that decision, and so part of it is about how we augment, part of it is about how we engineer the network, part of it is the traffic management itself, but at the core we want to be able to make sure that our customers get access to all the services they're interested in.

5146   And that is really why we say we believe in an open Internet. We benefit greatly from the fact that the Internet continues to evolve.

5147   COMMISSIONER MOLNAR: Okay.

5148   I want to move on to the issue of wireless services.

5149   You say you do not currently rate shape, and rate shape is the same as traffic shape; is that true?

5150   MR. ENGELHART: Yes.

5151   COMMISSIONER MOLNAR: The same term. Yeah, okay. That you do not rate shape on your mobile data traffic today.

5152   Are there any technical differences that would impact upon the choice or use of ITMPs between a wireless and a wire line network? Are the options available the same?

5153   MR. ENGELHART: The options are the same, the network is different and the behaviour of the customers might be different, so the solutions might be different, but the options would be the same.

5154   COMMISSIONER MOLNAR: Okay.

5155   I'm just trying to understand some of the comments you put in your reply, and I'm going to turn to your reply comments now.

5156   Paragraph 51 of your rely comments you say that:

"Rogers does enter into commercial arrangements with companies who seek Rogers' marketing and distribution support." (As read)

5157   COMMISSIONER MOLNAR: In another section under section 7 -- section 7 actually you've titled Wireless Carriers Provide Preferential Treatment for Content in Walled Gardens.

5158   And in there again you say that:

"Rogers has entered into commercial arrangements that allow our customers to browse the website of our partners free or obtain free content." (As read)

5159   COMMISSIONER MOLNAR: And I'm trying to understand if that is an approach that was put forward to us earlier last, or this week -- last week by Juniper where they talked about whitelisting.

5160   Is this whitelisting within a walled garden, or what is it when we talk about providing preferential content or content under a different pay structure?

5161   MR. ENGELHART: I'm going to let Upinder answer most of the question.

5162   But I guess the point we were making there is all ISPs, wire line or wireless, generally have a home page and there's generally some content there that people can link on, and very often you make an arrangement, as Rogers wire line has with Yahoo, where there's some Yahoo content on that home page.

5163   So, wireless ISPs are no different, they have a home page that has some content, and I don't -- I'm not familiar with that term whitelisting, but I'll pass it over to Upinder.

5164   MR. SAINI: Thank you.

5165   So, as Ken has mentioned, similar to the wire line ISPs, there is a home page that the wireless providers also offer, and if you take example of, you know, any wire line ISP, on the home page the partners that are listed generally have some sort of a commercial arrangement whether in terms of marketing or distribution to the customers.

5166   So, very similar to that, you know, we have a home page and we have certain partners that are listed on that home page and those partners have come to us seeking cooperation from Rogers wireless in terms of marketing their products and services to our subscriber base and that -- the technology has evolved quite a lot.

5167   We are looking at a point where, you know, the next generation devices or, you know, otherwise Smart phones have the capabilities that if the customer wants to go to any particular page they could, they don't need to go to the home page provided by the wireless operator.

5168   Another point I would like to make is that --

5169   COMMISSIONER MOLNAR: Sorry, I just was trying to understand if there was any traffic management content prioritization or otherwise that's associated with this activity?

5170   MR. ENGELHART: No.

5171   MR. SAINI: No.

5172   COMMISSIONER MOLNAR: No. Okay.

5173   Thank you. Those are my questions.

5174   THE CHAIRPERSON: Len?

5175   COMMISSIONER KATZ: Thank you, Mr. Chairman.

QUESTIONS

5176   COMMISSIONER KATZ: Good morning.

5177   I've got a couple of questions.

5178   Your opening remarks, Mr. Engelhart, talked about cautioning the CRTC about us setting a framework when it may be premature at this point in time and you told us to look around the world at other jurisdictions as well.

5179   And obviously the one closest to us is the U.S. and the FCC, and you said they've done nothing at all.

5180   Yet I've got in front of me here the FCC's statement that they made in 2005 and I think coming out of that was the finding that they made in the Comcast case where they basically said Comcast was actually discriminating and perhaps what they need to do is provide something much more agnostic from an applications perspective, which they have now done.

5181   So, I've got two questions. One is, what exactly did Comcast do to relieve the concern of the FCC?

5182   You also said earlier that you're prepared to look at some of these issues although there will be a cost associated with doing it and I need to understand what that cost is, how significant that cost would be if you were to follow the net neutrality statement that the FCC came out with in 2005 that drove Comcast to having to modify how they handle traffic.

5183   MR. ENGELHART: So, I think -- thank you, Vice-Chairman Katz. I think the 2005 statement was mostly about net neutrality, it said very little about traffic management other than saying that all of the net neutrality principles were subject to reasonable traffic management.

5184   And if your guideline says that we're entitled to do reasonable traffic management, that's a guideline we can certainly live with.

5185   In the Comcast case I think part of it is, you know, as lawyers like to say, bad facts make bad law. Comcast denied, denied, denied that they were engaging in this packet re-set methodology, that didn't help them. They hired actors to come to the hearing and clap when the Comcast witnesses gave evidence, I don't think that helped them.

5186   So, all of their behaviour thoroughly annoyed the FCC.

5187   Whether their traffic management practices should have been prohibited or not, I don't know. I don't know enough about their network or what they were doing.

5188   The FCC didn't tell them what to do and, in fact, most of the U.S. cable companies manage their traffic exactly like we do, carriers like Cox.

5189   But for whatever reason Comcast, instead of going to the Cox methodology from their methodology, which involved these phony re-set packets, they decided to use the method that they have employed, which we think would be bad for our customers.

5190   If I indicated to you that we would be prepared to work with it, I misspoke. We don't think the Comcast methodology is good at all. If we were forced to do it, of course we would do our best, but we think it's a mistake for the reasons that I indicated to Commissioner Molnar.

5191   In terms of the cost, it could be fairly huge. As Mike and Dermot have said, before we did the traffic management of peer-to-peer file sharing upstream we would augment the node and then 12 hours later it had to be augmented again. So, we might spend a huge amount of money and only to offer the same service that we're offering now.

5192   COMMISSIONER KATZ: Comcast did, and I guess what we'd like to get on the record is what it would take if you were required to do that.

5193   What did Comcast physically do, I guess, is one of the issues.

5194   What did they change, what were they doing before, and we know what they were doing before, I believe it was probably preferring one application to others obviously and they were told not to do that, and that's why they had to change the way they were traffic managing or throttling or whatever they were doing.

5195   But, first of all, it would be nice if you can put on the record for us what they were doing, what they are doing. It took them six to nine months I gather to transition. They said they would do something by the end of last month -- last year, and what did it cost them to do it.

5196   MR. ENGELHART: So, we will -- I'll briefly describe it now and we can give you more detail in our argument.

5197   So, what they were doing before is what the equipment manufacturers call session management. So, peer-to-peer files are broken up into a bunch of chunks called sessions and there's a communication between the source and the destination where they say I want that session, and I've now got that session, you don't have to send it any more.

5198   And Comcast methodology was sending out re-set packets to say, I've already got the session, I don't need it any more, when in fact the session hadn't been sent. So, that's what they were doing.

5199   Quite different than what we're doing or other ISPs are doing. It involves sending these phony re-set packets to stop a session from flowing.

5200   According to their evidence at the FCC all the sessions would eventually get through, and so it really just involved slowing down, it didn't involve stopping anything, but the FCC obviously took umbrage with it.

5201   What they're doing now is quite a different methodology again that no one is doing and it doesn't involve deep packet inspection, it involves using the CMTS which is the switch, if you will, that cable modem networks use and that switch looks at the traffic in an individual node and says when that is approaching congestion I will slow down any user that is at 70 percent or 90 percent of their total capacity and I will slow them down for another 15 minutes for all their traffic.

5202   So, it probably targets a lot of peer-to-peer traffic, it probably targets people who are peer-to-peer file sharing users, but then it slows down all of their traffic, not just their peer-to-peer file sharing.

5203   And that's why I said before, we would hate to use that methodology because it would mean that our customers for that 15 minutes maybe couldn't make a VOIP call or couldn't send photos to their friends or do any of the other things they wanted to do. So, I think it would be bad for our customers.

5204   Now, in terms of their cost, I know we chat with them occasionally but I don't know if we have much access to their costs. My colleagues are indicating that they haven't confided that in us, so we don't know what it cost them.

5205   COMMISSIONER KATZ: Could you see what you can get from them?

5206   MR. ENGELHART: We can ask.

5207   COMMISSIONER KATZ: I appreciate that very much.

5208   My last topic is with regard to customers, and you focus on the customer and you said we should focus on the customer as well.

5209   One of your customers are wholesale customers and I want to focus on those for a few minutes. And I've got a copy of the TPIA tariff which is CRTC (10:36-11:13) 2000-04 and it's actually dated the year 2000, so it may be outdated, but I'm going to refer to it anyways.

5210   There's a couple of clauses in here that I just want you to comment on. One of them is the definition of service and a customer.

5211   You define a customer as an ISP that subscribes to the TPIA service for the purpose of providing its end users with retail IS, Internet service.

5212   Does that preclude the -- what we heard in the last week about application providers and people who want to build applications and utilize the TPIA for that purpose and that your customers, these wholesale customers you're selling to cannot use this tariff and the services inherent in it to sell applications to new innovators?

--- Pause

5213   COMMISSIONER KATZ: You may want to come back to me after you --

5214   MR. ENGELHART: Can you give me an example of what you are referring to?

5215   COMMISSIONER KATZ: Well, we heard last week a number of parties out there basically saying that P2P throttling and traffic management inhibits innovation. We also heard that P2P is a hungry network hog from some people as well and there is a correlation then I guess to some extent.

5216   But at the end of the day the issue here is you are limiting the application of your network to resellers, value-added providers. I think I was corrected last week to say they are not just resellers, they are actually providing value-added services.

5217   My question to you is: Within the context of this tariff are they allowed to work with entrepreneurs and innovators to build enhancements and value-added services or does this tariff, the way I just read the definition of a customer -- and I will refer you to other sections in here as well -- limit the ability for your wholesale customers to sell value-added services?

5218   Like I said, if you want to think about it and get back to me...

5219   MR. ENGELHART: As far as I know, as long as the resellers are ISPs providing an Internet service, they can enhance it any way they want, as far as I know.

5220   COMMISSIONER KATZ: Okay.

5221   Then going on on that tariff, there is a fee obviously for the use of the service, but there is also an overage charge. It says:

"The basic rate includes 6 gigs of data transfer allowed each month, including up to 1 Gb of upstream. Additional usage will be billed in 100 MB increments." (As read)

5222   And when you go above it and you have other conditions here.

5223   So you have a usage-based wholesale tariff here for wholesalers, for ISPs.

5224   So the question is: When you are charging based on usage, why would you traffic management them at all, or throttle them at all, if in fact they are paying for what they are getting?

5225   MR. ENGELHART: Currently we don't charge them additional usage and we don't traffic manage them, but we have reserved the right to do both.

5226   The difference is that they are just like our customers, they occupy the access network. From a network management perspective they are no different from our customers. Our customers also pay additional usage charges when they hit that cap.

5227   So our customers pay $50 a month for the service, the resellers pay us $25 a month for the service, but their impact on the network is just the same as one of our customers so we reserve the right to manage their traffic just like one of our customers.

5228   And yes, our customers also pay when they get over 95 gigs or 60 gigs, as the case may be.

5229   COMMISSIONER KATZ: Okay.

5230   Another clause in here that says:

"Rogers reserves the right to monitor bandwidth usage, transmissions made or content posted or distributed via the TPIA service." (As read)

5231   Does that mean by monitoring the content posted you are actually going beyond the deep packet inspection that we know of, which is looking at bits, but actually monitoring the content?

5232   MR. ENGELHART: As I recall it, when we put that tariff together we lifted all those clauses from the telephone tariffs because they seemed like a good precedent, but in fact we are not doing any of those things right now.

5233   COMMISSIONER KATZ: Okay.

5234   Those are my questions, Mr. Chairman.

5235   Thank you.

5236   THE CHAIRPERSON: Suzanne...?

5237   CONSEILLÈRE LAMARRE: Merci, Monsieur le Président.

5238   Good morning. I have a few questions.

5239   I must say that the way you are describing P2P application in your presentation this morning, and also in your submission, it leads me to great reservations and I'm going to tell you why.

5240   You gave the example, you know, several times about movies, downloading movies, as if this was the only peer-to-peer application that did exist. On top of that, you talked to us about an experiment that Mr. O'Carroll repeated last Friday, which I fully appreciate.

5241   But I must tell you that to me this is nothing more, but nothing less, than anecdotal information. This is not scientific data. But given the extent of the monitoring that you are obviously doing, do you have such scientific data in the form of a report that shows that indeed a major part of the uploading on your network on peer-to-peer is going to non-Rogers or even non-Canadian Internet users?

5242   (b) that most users doing peer-to-peer are doing it 24/7 and whether or not this action of peer-to-peer 24/7 by some users, goes beyond the maximum use of the bandwidth that you have actually sold to that customer?

5243   MR. ENGELHART: No. It can't go beyond the bandwidth that we have sold to the customer. That can't happen.

5244   COMMISSIONER LAMARRE: Okay.

5245   MR. ENGELHART: In terms of the 24/7 usage on the upstream, I think that's just inherent in the nature of these protocols, but we -- and in terms of the source of a typical uploader, we will see if we can give you some more rigorous scientific evidence on that.

5246   COMMISSIONER LAMARRE: Yes. That would be appreciated because, frankly, so far, you know, everything I have heard in this proceeding to me seems anecdotal and that information is being used to try to convince that there is an epitome, but, you know, if there is such data we need the scientific data.

5247   Moving along to a totally different topic. Wireless.

5248   You have mentioned in your presentation this morning that currently you are not doing any traffic management on the wireless, but surely you are not charging for data access and downloads on your mobile wireless at the same rate as you are charging on the wireline?

5249   MR. ENGELHART: Yes. I think we have right now a $30, a $50 and an $80 package for wireless and the caps are lower than they are for the wireline service.

5250   COMMISSIONER LAMARRE: So you are currently managing it, but in an economical fashion.

5251   MR. ENGELHART: You could say that we are using price to manage it, yes.

5252   COMMISSIONER LAMARRE: Okay. Thank you.

5253   On the privacy issue, would you agree that shallow packet inspection would raise less concern or have less impact on privacy then would deep packet inspection?

5254   MR. ENGELHART: No, I would not.

5255   We are doing shallow packet inspection, as Mr. Lee discussed, because most of these peer-to-peer filesharing protocols arrive at our network encrypted today. So we use what the expert calls shallow packet inspection, which we call heuristic. So our equipment does both.

5256   But I think there has been a bit of a misunderstanding about the use of deep packet inspection and privacy, at least the way we do it.

5257   There is some equipment that can look at the different types of packets and figure out what they are. This one is a VoIP packet, this one is a peer-to-peer filesharing packet, this one is a Web surfing packet, and it says the only ones I care about are the peer-to-peer filesharing. I'm going to send them over here to the left. All the other ones can go either to the left or to the right as they please. And it does that in real time.

5258   It doesn't keep any record of which customer was doing the peer-to-peer filesharing or which customer was doing anything else. It doesn't look at the contents of those packets, it just classifies them, ships them and moves on.

5259   So I really think there has been a big misunderstanding when people think that the equipment that we use has privacy implications. You can buy deep packet inspection equipment that has lots of privacy implications and, quite frankly, all carriers and all networks and credit card companies and all sorts of people can do all sorts of privacy invasive things if they want.

5260   COMMISSIONER LAMARRE: But we are talking about you this morning. We are not talking about the others.

5261   MR. ENGELHART: Right.

5262   There are lots of privacy invasive things we could do, but we are not. There is no business case for us to do it, it's against the law, and this equipment, as it is currently configured, can't be privacy invasive.

5263   COMMISSIONER LAMARRE: So, if I understand you correctly, you are saying that the fact that you merely monitor the types of applications that your clients are using, to you is not a privacy infringement?

5264   MR. ENGELHART: I think I might quarrel with the word "monitor". I would say sort or --

5265   COMMISSIONER LAMARRE: Well, to sort you have to monitor.

5266   MR. ENGELHART: Yes, but it's -- I take your point. It's done in real time, no record is kept. We cannot tell you which customers were doing peer-to-peer filesharing and which weren't, so in my view we are not collecting, using or disclosing customer information and therefore there is no reason to be concerned about privacy.

5267   COMMISSIONER LAMARRE: Are you keeping aggregated data of what has been going on in your network though?

5268   MR. ENGELHART: I believe we do keep aggregated data, yes.

5269   COMMISSIONER LAMARRE: Well, can you confirm whether or not it's a fact?

5270   MR. ENGELHART: Dermot...?

5271   MR. O'CARROLL: Yes. I mean we do keep aggregated data.

5272   I mean, first of all, we bill our customers for total usage above the cap so we have to keep aggregated data in order to accomplish that.

5273   COMMISSIONER LAMARRE: Okay.

5274   MR. O'CARROLL: We also, for a network management point of view, keep aggregated data on overall types of flows. So try to understand what percentage of our traffic is Web browsing, what percentage is e-mail, et cetera, that's all.

5275   COMMISSIONER LAMARRE: Okay.

5276   Those are my questions. Merci, Monsieur le Président.

5277   THE CHAIRPERSON: Tim...?

5278   COMMISSIONER DENTON: Lady and gentlemen, good morning.

5279   Obviously here we are in the presence of two very large and somewhat different narratives and the narrative coming out of places like CIPPIC or the Open Internet Coalition would tell us that traffic and traffic congestion can be met by growth of the network, that the increase of network traffic is not so great that it cannot be met.

5280   The second proposition is that application-specific throttling can never be legitimate, either in terms of section 27(2) or section 36.

5281   I would say the third point they make is that contractual arrangements can help solve the problem. In other words, a lot of this is a question of business arrangements and charging for usage. And I think the fourth point that would be made by various experts was that to maintain a forward-looking process and don't overreact to temporary problems.

5282   Now, in the voice of sweet reasonableness with which you are so expert, you have told us: Everyone calm down. There is going to be -- rational people will solve this problem and this involves application-specific throttling.

5283   I would like you to, if you could, tell us why you think the Open Internet Coalition and CIPPIC just don't have the story right and where you think you agree and where you think you don't agree.

5284   MR. ENGELHART: Sure.

5285   So starting with the first point, that growth can be met through augmentation, essentially we agree with that. I mean we are spending vast amounts of money on augmentation and we are successfully meeting that growth. I mean, as Professor Odlyzko said, you have growth of 40 or 50 percent a year, which is certainly considerable, and we are spending tens of millions of dollars a year to augment that growth and we are quite proud of that. In fact, we augment six months before there is a problem.

5286   So the augmentation that Dermot is doing today is to meet forecasted congestion problems in six months. So we are always staying ahead of the congestion that happens to ensure that our customers have a good experience.

5287   The second point is application-specific means.

5288   I understand why they are concerned about application-specific traffic management, it relates back to this whole network neutrality debate that started five years ago. They are worried that we are going to hunt down some packets if someone doesn't pay us some money.

5289   But I think they are confusing the two issues. This is not a network neutrality issue, this is a case where some applications, namely peer-to-peer filesharing, have a different behaviour, they have a different characteristic. If any other application, one that was designed to cure cancer, had the same characteristics, we would have to manage it, because we have a network which is designed to be a shared use network. A shared use network means you use it, someone else uses it, someone else is away on holidays and they are not using it.

5290   I mean a 1.44 Mb per second T-1 service is not like that, it's a dedicated channel that you can have whatever you want at a guaranteed rate of speed. It costs a couple hundred dollars a month or $300 a month. Our service is 10 Mb, way faster, for $50 a month. So the reason that works is because it's a shared use network, it's not a nailed up connection. And when a certain application tries to take a nailed up connection, it can't expect -- or the users using it can't expect to get that kind of performance for $50 a month.

5291   So we target the applications, not because of the content in those packets, but because of the behaviour of the application. And if you are worried about the behaviour of a certain type of traffic, I think it's fair to manage the traffic.

5292   The third point is that usage charges can be effective and I agree, but to make them fully effective, in other words to get rid of traffic shaping, you might have to have a very low cap indeed so that all of our users are paying essentially per bit.

5293   I think that is going to upset a lot of people. They don't like it. They hate it. They really want to be able to use their Internet service without worrying about being charged for every bit. We are trying to have happy customers.

5294   I guess don't overreact to temporary problems, I would sort of agree with that one. You know, you should take a broader view of this thing and have some confidence that what we are doing is to manage the network.

5295   I mean, the whole premise behind all of this stuff is that we are somehow doing this to favour our video business. If that's true, why wouldn't we be managing the downstream? If that's true, why wouldn't we be going after video streaming which is, as every expert has said, a way more popular way of distributing video then peer-to-peer file sharing. If that was true, why would the universities be managing their networks the same way?

5296   So for all of these reasons I would disagree with a lot of the narrative that they have presented.

5297   COMMISSIONER DENTON: Those are my questions. Thank you.

5298   THE CHAIRPERSON: Thank you.

5299   Let me go back to your opening, because you basically said we control downstream, we don't control upstream. We control downloading with economic measures and pricing, et cetera. Upstream is there for anybody, they will use up everything, et cetera.

5300   Now, if you were not allowed to do that, are there other ways than the throttling that you are talking about that you can control the uploading?

--- Pause

5301   MR. ENGELHART: I guess before we had traffic shaping, we were in a state of congestion continuously in the upstream network. If you didn't let us do traffic shaping I suppose we would try other pricing mechanisms or other mechanisms, but I think they wouldn't work as well as what we are doing now. Certainly most of the carriers that we have talked to, in most parts of the world, do what we are doing.

5302   THE CHAIRPERSON: Now, I'm just wondering why you couldn't put a pricing mechanism on the uploading? Here you get 5 Mb of downloading and you have "X" much of uploading. You can't use -- it can't be used more or something. Why is it -- you are basically telling me uploading I don't control and therefore I have to traffic shape and there are no --

5303   Is there not an economic way that you can deal with it rather than on what you are doing right now, which is in effect an application-based discrimination? You legitimize it because you want to avoid congestion, I understand that, but I'm just trying to find out whether there is a non-discriminatory way of doing it or an economic way of handling this issue not discriminatory or an economic way of handling this issue?

5304   MR. ENGELHART: I have been thinking about that as we prepared for this hearing, because both of us with our background in economics tend to think about pricing as a way of solving problems.

5305   I think you have to have a differential rate for upstream bandwidth and downstream. You would have to have a pretty low cap for upstream. You would have to educate your customers that when they are using peer-to-peer file sharing their computer is being used as a source of documents for other people in the world, because many of them aren't aware of that.

5306   THE CHAIRPERSON: Yes...?

5307   MR. ENGELHART: So you would have to do quite a bit of education. You would have to put in some fairly sophisticated pricing.

5308   I'm not saying it's impossible, but I'm thinking it would be tricky and I'm thinking it would annoy a lot of customers and I'm not aware of anyone who has done it.

5309   THE CHAIRPERSON: Okay. But especially looking down south of us, they have basically said you can't -- if I understand what they have said in the Comcast, you can't do application-based throttling, you have to do something else.

5310   MR. ENGELHART: No. No.

5311   In fact Cox for example does exactly what we do. Most U.S. cable companies do exactly what we do.

5312   What they told Comcast to stop doing was what I referred to as session management --

5313   THE CHAIRPERSON: Yes...?

5314   MR. ENGELHART:  -- this practice of sending reset packets. But most carriers down there do traffic shaping the same as we do and the FCC has not told them to stop.

5315   THE CHAIRPERSON: Okay.

5316   Earlier at this hearing I sort of floated the idea which you undoubtedly heard and ignored, which is could one have a two-stream rule, saying its ex post for any kind of traffic management unless it's application base, then it should be ex ante, you should first come and explain to us and say why you are forced to use this. This is really the last resort because on the face of it it seems to be violating 27(2).

5317   What do you think of an approach like that?

5318   MR. ENGELHART: Well, I would harken back to what the gentleman from Sandvine said, which is that an application -- that an unmanaged network is not a neutral network.

5319   You might just as well ask unmanaged ISPs to come before you, because they will be impacting certain types of traffic and certain types of application and certain types of behaviour. So I'm not sure that it makes sense to say because you are engaged in application-specific management you are doing something non-neutral.

5320   The other point I would make is, as Mike explained, there are all sorts of decisions we make that benefits some users and not others. We engineer the network, as Mike said, to a certain level of latency. Mr. Katz, who is the avid gamer, probably is frustrated by this and could level a complaint against us that we should have a lower level of latency. And that would cost money for all customers, but it would make Mr. Katz happy. Is that an application-specific traffic management? No, but it affects gamers.

5321   It's in the nature of having a consumer grade shared use network that you are going to make compromises and you are going to try and hit a lowest common denominator and you are going to make some people happy and not others.

5322   So we certainly have no problem with explaining to the Commission in confidence at any time what we are doing about any of our traffic management, but I don't think the forcing application-specific traffic management processes -- practices alone to come before you and explain themselves makes a whole lot of sense.

5323   THE CHAIRPERSON: Okay.

5324   Well, thank you for your presentation. I must say, until you came today I had not appreciated the difficulty of uploading and applying economic measures to it and why you are doing it. So if between now and the final submission you have some spark of brilliance, please share it with us.

5325   Okay. Thanks.

5326   We will take a 10-minute break.

--- Suspension à 1110

--- Reprise à 1126

5327   THE SECRETARY: Order, please. A l'ordre, s'il vous plaît.

--- Pause

5328   LE PRÉSIDENT : Commençons, Madame la Secrétaire.

5329   LA SECRÉTAIRE : Merci, Monsieur le Président.

5330   J'inviterais maintenant Quebecor Media, au nom de Vidéotron ltée, à faire sa présentation.

5331   M. Dennis Béland comparaît pour Quebecor Media, au nom de Vidéotron. Il nous présentera son collègue. Vous aurez ensuite 15 minutes pour votre présentation.

PRÉSENTATION

5332   M. BÉLAND : Monsieur le Président, Monsieur le Vice-président, Télécommunications, honorables Membres du Conseil, mon nom est Dennis Béland, Directeur, Affaires réglementaires, Télécommunications pour Quebecor Media inc.

5333   Je suis accompagné de Monsieur Pierre Roy, Vice-président, Ingénierie, Technologies IP, pour Vidéotron ltée.

5334   Comme vous le savez tous, Vidéotron est le plus important fournisseur de services d'accès Internet au Québec, avec aujourd'hui plus d'un million de clients.

5335   L'exceptionnel taux de satisfaction de la clientèle de Vidéotron, au-delà de 98 pour cent pour le service d'accès Internet selon le dernier sondage Léger Marketing de mars 2009, n'est pas du tout étranger aux talents de Monsieur Roy et des hommes et femmes de son équipe qui gèrent notre réseau sur une base quotidienne.

5336   Nous vous remercions de cette opportunité de comparaître devant vous sur un sujet d'importance fondamentale pour notre compagnie et nos clients.

5337   Les directives que vous pourriez émettre suite à cette instance auront un impact direct sur notre capacité à offrir des services d'accès Internet abordables et de qualité, et plus important encore, sur notre capacité d'innover pour répondre aux besoins évolutifs de notre clientèle.

5338   S'il y a un seul message qui doit être retenu de notre intervention, c'est que l'Internet est un réseau dynamique -- dynamique et imprévisible. La diversité des mécanismes de gestion de trafic qui existent aujourd'hui et qui existeront demain fait intrinsèquement partie de ce dynamisme.

5339   Dans ce contexte, il est indispensable que le Conseil résiste à la tentation de vouloir imposer un cadre réglementaire visant la mise en place d'un modèle idéalisé et statique de l'Internet qui, dans les faits, n'a jamais existé et n'existera probablement jamais.

5340   Certains des intervenants participant à cette audience ont justement tenté de vous convaincre que l'adoption de pratiques de gestion de trafic par un opérateur de réseau, qu'elles soient économiques ou techniques, n'est qu'un simple stratagème visant à éviter d'investir dans son réseau.

5341   Certains y voient même un aveu d'échec de la part des opérateurs quant à leur capacité à subvenir aux besoins des Canadiens en services d'accès Internet.

5342   Face aux centaines de millions de dollars investis chaque année par les opérateurs de réseaux canadiens, dont pas moins de 280 millions de dollars par Vidéotron pour la seule année 2008, cette déclaration est pour le moins étonnante. Une telle position est non seulement contre-productive -- qui, hormis les consommateurs canadiens, financera ultimement toutes ces dépenses? -- mais va directement à l'encontre des principes qui ont permis à ce jour à l'Internet d'être si accessible à la population en général.

5343   L'Internet est un réseau partagé, dont le génie a toujours été de trouver des solutions technologiques permettant un partage toujours plus efficace de ses installations, au grand bénéfice de l'ensemble des utilisateurs finaux.

5344   Du choix initial d'effectuer le groupage de données par paquets, à la mise en place de mécanismes évolués de gestion de file d'attente, au développement des pratiques les plus récentes de gestion de trafic, les opérateurs de réseaux ont toujours cherché à rentabiliser au maximum leurs investissements. Autrement dit, c'est ce souci pour le partage efficace qui rend les services d'accès Internet si performants et si accessibles à la population en général.

5345   II est illusoire de penser qu'une interdiction des pratiques de gestion de trafic Internet inciterait les opérateurs à investir plus dans leurs réseaux. Bien au contraire, l'adoption d'une telle politique priverait les opérateurs d'un outil puissant permettant de gérer leur croissance et ultimement, de satisfaire à la demande toujours croissante de nouveaux services et de bande passante.

5346   Vidéotron applique des limites mensuelles d'utilisation de capacité de la bande passante à toutes ses offres d'accès Internet haute vitesse résidentielles. Au-delà de ces limites, l'utilisateur final de Vidéotron doit payer des surcharges pour l'utilisation excédentaire de la bande passante.

5347   Ces informations sont affichées ouvertement sur notre site web, sont présentées dans notre contrat de service, et sont disponibles auprès de notre service à la clientèle.

5348   Tous les utilisateurs finaux de Vidéotron ont également accès à un compteur permettant de suivre leur consommation sur une base quotidienne et mensuelle.

5349   Vidéotron a choisi d'appliquer des limites mensuelles d'utilisation de capacité et des surcharges pour l'utilisation excédentaire afin d'éviter une situation où une minorité d'utilisateurs finaux consommerait une quantité disproportionnée de ressources, privant ainsi les autres utilisateurs finaux d'un accès équitable à la bande passante.

5350   Les limites mensuelles d'utilisation de capacité et les surcharges pour l'utilisation excédentaire créent un incitatif financier qui pousse l'utilisateur final à surveiller sa consommation et à la maintenir à l'intérieur de limites raisonnables.

5351   Vidéotron n'utilise pas actuellement de solutions dites techniques, comme l'inspection approfondie des paquets, l'IAP, pour gérer le trafic Internet sur son réseau. Pour le moment, la compagnie est satisfaite des résultats obtenus avec les pratiques de gestion dites économiques que nous venons de décrire.

5352   Cela ne veut pas dire pour autant que Vidéotron est d'avis que les pratiques de gestion économiques seront toujours efficaces et qu'elles n'auront jamais à être accompagnées de solutions techniques.

5353   Au risque de se répéter, l'Internet est un réseau profondément imprévisible.

5354   Peut-on affirmer avec certitude que les internautes vont toujours réagir de la même manière aux incitatifs financiers?

5355   Peut-on penser que le développement de nouvelles applications ou l'apparition de nouveaux phénomènes, les flash crowds, par exemple, pourraient lester le réseau sans toutefois augmenter la consommation brute de la bande passante, ce qui viendrait annuler l'efficacité des pratiques de gestion économiques?

5356   Les internautes vont-ils exprimer une préférence pour des fournisseurs qui optent pour des solutions techniques judicieuses ou des fournisseurs appliquant des pratiques de gestion économiques adaptées?

5357   On le constate, la réponse à ces questions nécessite, tant pour le Conseil que pour Vidéotron, l'évaluation en profondeur de plusieurs impondérables que seul le temps permettra de bien saisir.

5358   Or, la pire façon de servir l'intérêt public face à autant d'incertitude mais tout autant de potentiel d'innovation, serait de forcer tout le monde à faire la même chose.

5359   Une concurrence énergique et bénéfique peut exister non seulement entre fournisseurs et entre réseaux, mais aussi entre méthodes de gestion de réseaux.

5360   Cette réalité est encore plus pertinente quand on considère l'émergence de réseaux sans fil de troisième et quatrième génération capables d'offrir une alternative sérieuse aux réseaux filaires en matière de services à large bande.

5361   Quebecor Media fait d'ailleurs remarquer qu'elle construit actuellement son propre réseau de Services sans fil évolués, un projet qui requiert des investissements de l'ordre de 800 millions à 1 milliard de dollars sur quatre ans.

5362   Un réseau sans fil ne présente pas le même profil qu'un réseau filaire en termes de partage d'installations, structure de coûts, ou pratiques de dimensionnement. Rien ne laisse présumer que les techniques de gestion de trafic Internet les plus propices pour un réseau sans fil seront nécessairement celles qui ont été les plus propices pour un réseau filaire. II va sans dire que l'imposition d'un cadre réglementaire symétrique serait trop restrictif et risquerait d'empêcher les réseaux sans fil d'atteindre leur plein potentiel.

5363   En ce qui concerne les accusations voulant que des opérateurs de réseaux utilisent la gestion de trafic pour bloquer l'accès aux contenus ou pour bafouer la vie privée de leurs utilisateurs, force est de constater l'absence totale de preuves concrètes à cet égard. Dans un environnement compétitif où chaque opérateur à la liberté de choisir ses propres seuils de téléchargement, ou aucun seuil dans le cas d'un opérateur se fiant uniquement sur des pratiques techniques, et où il existerait un véritable engouement pour un nouveau type de contenu, il est peu crédible qu'un opérateur persisterait à refuser artificiellement à ses clients la bande passante nécessaire pour y accéder.

5364   Du côté de la protection de la vie privée, il nous paraît évident qu'il existe une nette distinction conceptuelle et fonctionnelle entre l'utilisation de techniques telles l'IAP pour gérer du trafic et l'utilisation de ces mêmes techniques pour la collecte ou le partage illicite d'informations de nature personnelle.

5365   Toute intervention réglementaire dans le fonctionnement d'un marché entraîne des coûts directs liés à la conformité, mais plus important encore, des coûts indirects associés au ralentissement de l'innovation.

5366   Une agence réglementaire a le devoir de s'assurer que ses interventions répondent à des problèmes réels et non pas à des problèmes spéculatifs.

5367   Before concluding let me also take the opportunity to address the matter of the application of traffic management practices to resale service providers.

5368   The resellers that have participated in this proceeding have generally maintained that Internet traffic management practices, both economic and technical, are wholly legitimate. However, in their view, underlying networks should apply these practices only to their own end users and not to their resellers' end users.

5369   In defense of this rather self-serving position, resellers have asserted that it is in their interest to manage by themselves their own end users.

5370   The Commission should take this assertion with a high degree of skepticism. On a shared network, when one end user or group of end users causes congestion on a particular facility, the impact is felt by all end users who use that facility.

5371   While it is the case that some facilities at some network locations may be under the control of resellers, the vast majority of local access facilities, at least in the case of coaxial cable networks, are not controlled by resellers and hence escape fully from their responsibility.

5372   Concretely, this means that when a coaxial cable operator detects congestion in a local cable cell, it falls upon the operator and the operator alone to make the investments necessary to correct the situation, whether the congestion is attributable to its own end users or those of its resellers. It is the network operator, and not the reseller, who must support the high costs of physically splitting the cable cell to increase capacity.

5373   Not only is the reseller completely unaware of this activity, it has no financial nor other incentive to ensure that these investments take place in a rational or orderly fashion. In other words, the reseller has no incentive to ensure that its end users act reasonably in relation to their neighbours.

5374   To employ the vocabulary of the Telecom Act, there is nothing unjustly discriminatory about applying the same traffic management practices, economic or technical, to one's resellers' end users as to one's own end users. On the contrary, it is the absence of symmetry in the application of these practices, if imposed by regulatory fiat, that would create an injustice.

5375   A network operator which is refused the ability to apply its practices symmetrically would soon find itself the target of resellers in search of arbitrage opportunities. These resellers would have an interest in attracting those end users who seek to circumvent the network operator's traffic management practices. The excessive costs of this arrangement would be supported solely by the underlying network operator and all other end users would suffer degradation in service. Such a result cannot be in the public interest.

5376   Monsieur le Président, dans nos soumissions à cette instance, nous avons fait savoir que la gestion active du trafic, que ce soit par l'entremise de pratiques économiques ou techniques, est devenue incontournable pour tout opérateur de réseau Internet qui cherche à offrir des services de qualité à prix abordable.

5377   Nous avons également établi que les craintes de ceux qui s'opposent à de telles pratiques, que ce soit en termes de discrimination injuste où d'atteinte à la vie privée, demeurent purement spéculatives.

5378   Finalement, nous avons constaté qu'il existe une concurrence saine dans l'élaboration et la mise en place de pratiques de gestion du trafic Internet, et que cette concurrence sous-jacente contribue amplement au libre jeu du marché dans les services d'accès Internet offerts à la population.

5379   Dans un contexte si dynamique, Quebecor Media soumet respectueusement que les instructions de la gouverneure en conseil obligent le Conseil à évaluer avec un grand discernement toute proposition d'intervention ex ante dans les pratiques de gestion du trafic Internet.

5380   Une intervention du Conseil ne peut être justifiée en l'absence de preuves concrètes selon lesquelles il existe un véritable problème.

5381   Merci encore pour cette opportunité de comparaître devant vous. Il nous fera plaisir maintenant de répondre à vos questions.

5382   LE PRÉSIDENT : Merci pour votre intervention.

5383   Premièrement, j'aimerais vous avertir qu'à cause de problèmes d'horaire, on va prendre une pause à midi et on va résumer à 2 h 00. Si on est en train de vous interroger, on va continuer à 2 h 00.

5384   Deuxièmement, vous dites ici, à la page 3, que vous utilisez vraiment des moyens financiers pour réguler l'usage de vos clients. Vous dites :

"Vidéotron applique des limites mensuelles d'utilisation de capacité de la bande passante à toutes ses offres d'accès Internet haute vitesse résidentielles. Au-delà de ces limites, l'utilisateur final de Vidéotron doit payer des surcharges pour l'utilisation excédentaire de la bande passante."

5385   Vous étiez ici quand Rogers a fait son témoignage, et le point de Rogers était que toutes ces surcharges, et caetera, ça fonctionne pour limiter le téléchargement des programmes, et caetera, mais c'est le problème de téléverser ou uploading où vraiment se trouvent le problème et qu'il n'y a pas de méthode financière pour discipliner ça, et à cause de ça, ils ont utilisé des moyens pour freiner les téléversements de P2P.

5386   Quelle est votre expérience? Est-ce que vous croyez que... Premièrement, est-ce que vous utilisez des moyens comme Rogers? Deuxièmement, sinon, comment évitez-vous les problèmes qu'ils trouvent?

5387   M. BÉLAND : D'abord, on n'utilise pas des moyens dits techniques de gestion de trafic, tels l'inspection approfondie de packets, comme Rogers.

5388   Donc, en ce qui concerne... votre question touche effectivement l'efficacité de nos méthodes économiques.

5389   LE PRÉSIDENT : Oui.

5390   M. BÉLAND : C'est vrai qu'en théorie l'application d'un plafond de consommation à l'ensemble de l'utilisation de la bande passante durant un mois, en théorie, ça pourrait ne pas affecter les catégories d'utilisateurs qui ont un impact particulièrement néfaste sur le réseau, tel l'utilisateur qui est continuellement en train d'envoyer les fichiers en amont, les uploaders.

5391   LE PRÉSIDENT : M'hmm.

5392   M. BÉLAND : Donc, c'est vrai qu'en théorie, le plafond ne va pas toucher à ce phénomène inquiétant.

5393   En réalité, ce qu'on observe sur le réseau de Vidéotron, c'est qu'il y a quand même une corrélation, que les gens qui... l'imposition d'un plafond de téléchargement de la manière que Vidéotron l'a fait a quand même une influence sur l'ensemble de l'utilisation de ces utilisateurs et, donc, a quand même une influence sur la quantité d'informations qu'ils sont en train d'envoyer en amont.

5394   Donc, la corrélation n'est pas parfaite, mais la corrélation est suffisante présentement pour nous donner une certaine confiance dans les mesures qu'on a choisies.

5395   LE PRÉSIDENT : Vous n'avez pas trouvé des problèmes de congestion? Rogers a dit que s'ils n'emploient pas ces méthodes techniques, le trafic P2P va complètement bloquer leur système.

5396   M. BÉLAND : Je vais demander à Pierre de peut-être donner des précisions, mais encore une fois, en appliquant nos plafonds de consommation, on a vu des impacts bénéfiques non seulement sur le montant global de consommation des grands utilisateurs, mais aussi sur la quantité de bande passante qui est utilisée en amont par ces utilisateurs.

5397   LE PRÉSIDENT : Est-ce que vous éduquez vos utilisateurs, pour dire, écoutez, votre système peut être utilisé pour les téléversements, également comme les téléchargements, et pour cette raison, vous devez bloquer les téléversements pour limiter l'usage ou quelque chose comme ça?

5398   M. BÉLAND : Je n'ai pas compris la question.

5399   LE PRÉSIDENT : Dans les programmes comme BitTorrent, et caetera...

5400   M. BÉLAND : Oui.

5401   LE PRÉSIDENT : ...il y a l'habilité de téléverser ou uploading en anglais, mais il y a aussi la facilité de bloquer les téléversements. Vous avez... vous comme utilisateur, vous avez le choix de bloquer les téléversements.

5402   M. BÉLAND : On ne fait pas de blocage maintenant, mais je peux demander à...

5403   LE PRÉSIDENT : Non, non. Est-ce que vous éduquez vos utilisateurs, vos clients, à dire, écoutez, il y a cette facilité-là et vous pouvez limiter les téléversements de votre ordinateur, de vos programmes?

5404   M. BÉLAND : On n'a pas de plan d'éducation spécifique, mais on constate quand même une réponse de la part de la clientèle, puis je vais peut-être demander à Pierre de préciser.

5405   M. ROY : Bonjour. Alors, depuis plusieurs années, voire '99, nous avons implanté des seuils à l'utilisation. Notre clientèle a très bien répondu au besoin. Monsieur Béland parlait de 98 pour cent de taux de satisfaction dans le dernier sondage marketing.

5406   La question que vous posez, c'est est-ce que nos clients sont éduqués? Je crois que les clients chez Vidéotron sont éduqués parce qu'ils comprennent l'utilisation et le fonctionnement, et dans le cas du téléversement ou l'uploading, ils vont soit limiter... parce que Rogers affirmait plus tôt 24 heures, est-ce que c'est durant 24 heures, est-ce que c'est huit heures par jour.

5407   Mais le peer-to-peer, lorsqu'il est en permanence sur un réseau, a un effet néfaste et donc fait augmenter l'utilisation d'un client. Les clients sont sensibilisés et eux vont soit limiter leur temps durant la journée où ils vont faire ces téléversements-là ou soit ils vont carrément ne pas le mettre en fonction.

5408   Jusqu'à maintenant, ces solutions-là nous ont permis de s'assurer qu'il n'y ait pas de congestion à l'intérieur de notre réseau et qu'il n'y ait pas d'effet néfaste de ces protocoles-là.

5409   LE PRÉSIDENT: Monsieur Béland, cette corrélation que vous avez observée entre les téléchargements et les téléversements, et caetera, est-ce que vous avez des dates que vous pouvez partager... des données que vous pouvez partager avec nous parce que votre témoignage est contraire, tel qu'on a eu des autres personnes, et j'aimerais, au lieu d'avoir des remarques comme ça, mais si vous avez des données que vous avez observées sur votre réseau, ce serait très utile pour nous de les voir.

5410   M. BÉLAND: On va voir quelles données on pourrait vous fournir. Je soupçonne qu'il en existe, certaines données et certains événements qu'on a eus dans notre réseau quand on a imposé des plafonds, changé des plafonds. On pourrait peut-être voir si on peut trouver en terme d'impact de ces changements.

5411   LE PRÉSIDENT: Oui.

5412   M. BÉLAND: En même temps, je veux préciser que, à mon avis, notre témoignage n'est pas nécessairement en contradiction avec les fournisseurs qui disent... qui constatent une nécessité de se fier à des pratiques techniques de gestion.

5413   Ce que j'ai dit de... c'est qu'on constate une certaine corrélation.

5414   LE PRÉSIDENT: Hum-hum!

5415   M. BÉLAND: La corrélation n'est pas parfaite. Ça nous donne présentement les résultats qu'on a besoin, dans le sens que l'imposition des plafonds semble contrôler à un certain point des problèmes de congestion, mais de là à conclure que c'est la méthode à suivre ou c'est une méthode parfaite ou que c'est une méthode qui va continuer à être si efficace, c'est une autre... c'est une autre question.

5416   LE PRÉSIDENT: Je peux apprécier ça. Suzanne, tu as des questions?

5417   CONSEILLÈRE LAMARRE: Merci, monsieur le président. Bonjour, messieurs.

5418   Monsieur Béland, je dois vous dire immédiatement que je suis certaine que le débit que vous utilisez dans votre présentation et pour répondre aux questions est un vrai bonheur pour les interprètes qui sont en devoir à l'arrière de la salle. Alors, comme ils ne peuvent pas eux-mêmes vous le dire, je me permets de vous le mentionner.

5419   Les questions que j'ai à vous poser suivent assez bien l'ordre de votre soumission et de vos répliques. Votre soumission avait le mérite d'être assez directe, alors ça va être facile d'avoir, peut-être, des questions un peu plus directes.

5420   Et pour continuer, là, sur la question de la méthode économique de gestion de trafic que vous utilisez, dans les présentations qui ont été faites, depuis la semaine dernière, lorsqu'on abordait cette question-là avec des intervenants, soit que c'était des fournisseurs de service internet, soit que c'était des représentants des consommateurs, il y a deux difficultés qui nous étaient présentées.

5421   La première, c'était d'arriver à informer les consommateurs correctement sur la dépense, l'utilisation de bande passante qu'ils font et la deuxième, c'était au niveau de l'insatisfaction présumée des consommateurs face à cette méthode-là.

5422   Et, vous, vous semblez avoir été capable de surmonter ces deux difficultés-là parce que, d'un côté, vous me dites le dernier sondage Léger Marketing dit que 98 pour cent de vos clients sont satisfaits du service qu'ils obtiennent.

5423   Et aussi, vous parlez dans votre soumission de compteurs qui permettent de suivre, là, la consommation quotidienne ou mensuelle de vos clients.

5424   Alors, dans le cas du sondage, est-ce que, ça, ce document-là, ce sondage-là, pourrait être disponible pour le Conseil?

5425   M. BÉLAND: Je pourrais demander à l'interne. C'est potentiellement le genre d'information qu'on pourrait partager avec vous en confidence.

5426   CONSEILLÈRE LAMARRE: Et l'autre chose, pour parler des compteurs, pouvez-vous m'expliquer d'abord du point de vue de l'utilisateur ce que ça implique? Est-ce que l'utilisateur doit entrer une session de clients avec vous sur votre site internet ou comment ça fonctionne?

5427   Et l'autre côté de la médaille, comment ça fonctionne pour vous au niveau de l'installation et de l'exploitation de ces compteurs-là?

5428   M. BÉLAND: Je vais demander à Pierre de répondre.

5429   M. ROY: Alors, c'est disponible sur notre portail de Vidéotron, l'utilisateur a juste à s'authentifier. Il a accès à une donnée quotidienne et elle est disponible, je ne sais pas à quelle heure précisément durant la journée, mais la donnée est mise à jour quotidiennement puis la personne peut voir quel est son taux d'utilisation quotidien.

5430   En terme de collecte d'information sur nos compteurs, je vous dirais qu'on est... on est en avant. Il y a des méthodes qui ont été mises en place pour permettre de collecter ces informations-là sur nos équipements et qu'on a utilisées. On a été dans les premiers à utiliser certaines fonctionnalités lorsqu'on a commencé à augmenter nos vitesses pour être beaucoup plus rapide.

5431   Mais aujourd'hui, ce système-là est fonctionnel du début à la fin et je vous dirais que je comprends votre question, mais pour nous, lorsqu'on approvisionne un client, on a un numéro de compte qui est relié à un équipement et cette information-là est envoyée dans nos systèmes de médiation.

5432   Si un technicien change d'équipement chez le client, cette information-là est mise à jour immédiatement parce que les techniciens ont des appareils portatifs qui permettent de mettre à jour cette information-là et c'est comme ça qu'on permet et comme ça qu'on a permis dans le passé de facturer ou de connaître l'état d'utilisation d'un client.

5433   CONSEILLÈRE LAMARRE: Donc, vous avez un million de clients, vous avez un million de compteurs sur votre réseau?

5434   M. ROY: Oui, oui.

5435   CONSEILLÈRE LAMARRE: Et ces compteurs-là sont reliés à votre système de facturation et si jamais il y a contestation de la part d'un client, c'est une contestation que vous êtes capable d'analyser soit en envoyant un technicien ou en ayant un technicien qui analyse le réseau ou par d'autres façons qui ne sont pas nécessairement, là, invasives pour le client?

5436   M. BÉLAND: Le but principal du compteur est de permettre au client de suivre sa consommation, mais en cas de contestation, c'est sûr qu'on va utiliser les mêmes données pour défendre la facturation qu'on présente au client.

5437   J'ajouterais aussi que... un point important. Ce même compteur, Vidéotron le rend disponible à nos revendeurs. On ne le rend pas... ce n'est pas à nous à avoir une interface avec les clients de nos revendeurs, donc on rend le compteur disponible aux revendeurs, eux autres ont le droit de le rendre disponible à leurs clients à leur façon.

5438   CONSEILLÈRE LAMARRE: Compte tenu, là, que vous avez fait un déploiement à grande échelle de ce type de technologie-là, est-ce que vous pourriez partager avec le Conseil les implications financières de ça pour une entreprise, c'est-à-dire combien ça coûte à mettre en place par 1 000 ou 10 000 utilisateurs? Ça, c'est de l'information que vous pourriez rendre disponible pour le Conseil?

5439   M. BÉLAND: Sûrement, des données sur les coûts de mise en place du compteur, ça devrait être possible, oui.

5440   CONSEILLÈRE LAMARRE: Et la durée de vie de cet équipement-là, c'est... vous envisagez ça sur quoi? Vous l'amortissez sur cinq ans, dix ans, vingt ans?

5441   M. BÉLAND: On va faire nos meilleurs efforts.

5442   CONSEILLÈRE LAMARRE: Merci. Maintenant, en ce qui concerne les préavis sur les méthodes de gestion de trafic internet qui sont utilisées, je vous rapporte au paragraphe 26 de votre soumission initiale.

5443   Il y a une partie du paragraphe dont je ne comprends pas du tout la teneur. Bien, je comprends un peu, mais je ne suis pas certaine.

5444   À la fin du paragraphe, vous dites: «Vidéotron se réserve toutefois le droit de déposer ex parte un avis de modification à son tarif AITP lorsqu'une modification à ses limites de capacité ou ses surcharges fait partie d'une nouvelle offre non divulguée au public avant sa date d'entrée en vigueur.»

5445   Pouvez-vous m'expliquer à quoi vous faites référence ici?

5446   M. BÉLAND: C'est pour tenir compte de la possibilité que Vidéotron lance une toute nouvelle offre dans le marché, disons une nouvelle option avec un nouveau seuil de téléchargement. Ça, c'est le genre d'offre qu'on n'aime pas annoncer d'avance à Bell Canada, par exemple.

5447   Donc, une obligation de divulguer 30, 60 jours d'avance que cette nouvelle offre sera lancée, aurait des... serait désavantageux pour Vidéotron dans le marché.

5448   Par contre, ce que nous faisons régulièrement, c'est pour des offres qui sont déjà dans le marché où il y a déjà des clients abonnés à ces offres, quand on change quelque chose, par exemple, la vitesse ou le seuil. Généralement, ce sont des changements qui sont favorables aux clients, on augmente la vitesse, on augmente le seuil.

5449   LE PRÉSIDENT: Oui.

5450   M. BÉLAND: Mais ces offres-là, étant donné qu'on veut donner à nos propres utilisateurs finaux un avertissement que ce changement s'en vient parce qu'on envoie des lettres à nos propres utilisateurs finaux, le changement est dans le domaine public et ça ne nous dérange pas du tout à le rendre disponible en même temps à nos revendeurs.

5451   CONSEILLÈRE LAMARRE: Mais pourquoi vous faites le lien entre ça et la divulgation de vos pratiques de gestion de trafic si la nouvelle offre que vous faites n'a pas d'impact sur une pratique de gestion de trafic internet?

5452   M. BÉLAND: Si on accepte la notion que la définition de pratique de gestion comprend des pratiques économiques...

5453   CONSEILLÈRE LAMARRE: Économiques.

5454   M. BÉLAND: ... autrement des seuils, le lancement d'une nouvelle offre avec un nouveau seuil serait une donnée concurrentielle importante pour nous si ce n'est pas connu du grand public.

5455   CONSEILLÈRE LAMARRE: Merci pour la clarification.

5456   Maintenant, l'autre préoccupation qui a été soulevée par des représentants de consommateurs est le fait que les pratiques de gestion économique pourraient avoir un impact malheureux sur des clients qui économiquement ont plus de difficulté que d'autres.

5457   Maintenant, je remarque, par contre, que dans votre réplique, au paragraphe 12, vous mentionnez que Vidéotron offre six niveaux de service d'accès internet avec des vitesses et des seuils de téléchargement différents.

5458   Donc, malgré le fait que vous imposez des quotas, si je peux me permettre l'expression, de bande passante mensuelle, et peut-être même des vitesses maximum, vous n'avez pas un format unique pour tous vos clients?

5459   M. BÉLAND: Non. Justement, il y a du choix, six offres différentes de la part de Vidéotron et, moi, dans ma tête, c'est à l'avantage du consommateur. Là, on rend possible au consommateur de choisir ce qu'il a besoin, quelle vitesse il a besoin, quel plafond il a besoin.

5460   Donc, la multiplicité d'offres, loin d'être contre le bénéfice du consommateur, ça me paraît évident que c'est pro consommateur.

5461   CONSEILLÈRE LAMARRE: Donc, vous vous permettez d'offrir vous-même des produits concurrentiels à l'intérieur de votre offre de service?

5462   M. BÉLAND: Un utilisateur qui veut télécharger énormément et qui a besoin d'un plafond élevé ou qui veut bénéficier d'une vitesse extrêmement élevée, Vidéotron, on va jusqu'à 50 mégabites par seconde maintenant, cet utilisateur a ses besoins, ma grand-mère a ses besoins aussi et il y a une offre pour les deux.

5463   CONSEILLÈRE LAMARRE: Faite attention; il y a des grands-mères qui sont de grandes utilisatrices de service internet.

5464   LE PRÉSIDENT: O.k. C'est midi et comme je vous avais dit, on va arrêter maintenant et on va recommencer à 1400.

5465   Merci beaucoup.

--- Suspension à 1200

--- Reprise à 1403

5466   LE PRÉSIDENT: On va continuer avec Vidéotron. Suzanne, tu reprends.

5467   CONSEILLÈRE LAMARRE: Merci. C'est là qu'on va voir si on réussit à avoir de la suite dans les idées même après un repas.

5468   Avant qu'on quitte, on a parlé brièvement, là, des notifications des avis envoyés aux clients en ce qui concerne les méthodes de gestion de trafic internet. Alors, je continue dans la même veine.

5469   Au paragraphe 29 de votre soumission, vous dites que... bon, pour les différentes raisons que vous énumérez: «Québecor soumet qu'il serait déraisonnable et même improductif» -- et là je mets l'emphase sur: «en terme de relation avec le client d'exiger une divulgation compréhensive des solutions techniques de gestion de trafic.»

5470   Alors, compte tenu que présentement ce ne sont pas le type de solution que vous avez en place, qu'est-ce que vous anticipez comme étant improductif en terme de relation avec le client?

5471   M. BÉLAND: Je crois que notre inquiétude principale, ça serait par rapport à la complexité des informations.

5472   Une divulgation ou une règle de divulgation qui nous oblige à émettre des informations extrêmement complexes, à notre avis, serait... ça va générer plus de confusion, plus d'appels au service à la clientèle qu'autre chose et ce n'est pas nécessairement dans l'intérêt des consommateurs.

5473   Une certaine divulgation, oui, mais pas dans une complexité qui est au-delà de ce qui est nécessaire.

5474   CONSEILLÈRE LAMARRE: Donc, ça serait d'arriver à déterminer d'une façon équitable pour la moyenne ou des fois un peu plus de vos clients ce qu'eux considèrent comme étant suffisant pour pouvoir prendre une décision informée, sans que vous soyez obligé de leur donner un cours d'ingénierie de réseau. C'est ça?

5475   M. BÉLAND: Exactement, oui.

5476   CONSEILLÈRE LAMARRE: Maintenant, je comprends votre position à l'effet que même si présentement vous n'avez pas mis en place des techniques de gestion de trafic internet technique, vous vous contentez des techniques économiques que vous dites que, bon, ça n'empêche pas que plus tard, on sera peut-être obligé de le faire et que, à ce titre, bon, votre position en tant que fournisseur de service internet, c'est la liberté totale, évidemment, c'est ce qu'il y a de préférable.

5477   Maintenant, ceci étant dit, vous vous appuyez pour soutenir cette position-là, sur le fait que le développement d'internet et des demandes, il y a un côté imprévisible à tout ça. Bon, je veux bien et, bon, ce n'est pas aujourd'hui qu'on va régler l'imprévisible.

5478   Mais ce que j'aimerais savoir c'est ce que, vous, vous faites comme prévision pour arriver à gérer votre trafic internet. Par exemple -- et c'est seulement, là, une piste, là, de question -- vous êtes arrivé jusqu'à présent à maintenir la demande, compte tenu de l'offre que vous avez et ce, avec des méthodes économiques.

5479   Est-ce que dans vos prévisions, vous envisagez les augmentations de vente de bande passante, par exemple, ou qu'est-ce que vous prévoyez d'autre?

5480   Autrement dit, je comprends qu'il y a un volet qui est imprévisible et à l'impossible nul n'est tenu, mais en même temps, si on veut essayer de faire des prévisions en tant que bon gestionnaire de service internet, de fournisseur de service internet, qu'est-ce que vous mettez de l'avant lorsque vous décidez ou non de prendre de l'expansion dans votre réseau ou de faire des offres différentes en terme de produits économiques que vous offrez à vos clients?

5481   M. BÉLAND: Mais tout détenteur de réseau, tout gestionnaire de réseau, va essayer de prévoir la charge totale, la demande sur son réseau. Nous, on le fait, comme Rogers l'a mentionné ce matin, ils font et ils essaient d'approvisionner six mois d'avance certains éléments du réseau. Nous, on a des laps de temps semblables pour nos activités, de prévisions.

5482   Donc, c'est sûr qu'on ne se fie pas uniquement sur nos méthodes de gestion économique. On prévoit puis on approvisionne le réseau aussi, mais il demeure que l'internet, l'évolution de l'internet est profondément imprévisible.

5483   Quelles seront les applications de choix dans un an ou dans deux ans? Quels comportements de clients vont paraître qui rendent nos pratiques économiques moins efficaces?

5484   Ce sont des imprévisibles et le message principal qu'on avait dans notre présentation initiale, c'est qu'on a besoin de la flexibilité potentiellement de changer de méthode si l'internet évolue dans le sens que d'autres méthodes s'avèrent plus efficaces.

5485   CONSEILLÈRE LAMARRE: Mais si on regarde ça de l'autre côté de la lunette, en même temps vous dites c'est imprévisible, Rogers ce matin disait: ça évolue excessivement vite, donc le danger si le Conseil met en place des lignes directrices, c'est que ces lignes directrices là ne seront pas adaptées à ce qui va se passer plus tard.

5486   Mais si on ne fait rien, le risque, à ce moment-là ne devient pas qu'on manque le bateau et que la machine s'emballe et que, finalement, les consommateurs et les citoyens canadiens soient face à un système de fourniture de service internet qui ne répond pas à leurs besoins et que le tort qui a été causé soit irréparable ou encore plus difficile à corriger par la suite.

5487   M. BÉLAND: Mais pour avoir cette inquiétude, il faut croire que c'est dans l'intérêt des fournisseurs de service d'accès internet à offrir des services insuffisants à leurs clients. C'est dans le marché, qui est un marché très compétitif ici au Canada, on ne voit pas que les forces du marché sont telles que les fournisseurs de service d'accès internet est un incitatif à dégrader leurs services envers leurs clients.

5488   Nous, Pierre et notre équipe de marketing et le restant de notre équipe, quand ils se lèvent le matin, ils ne se lèvent pas en cherchant des opportunités de dégrader le service aux clients.

5489   CONSEILLÈRE LAMARRE: Non, mais ils peuvent...

5490   M. BÉLAND: Et les forces sont très puissantes dans l'autre sens, dans les faits.

5491   CONSEILLÈRE LAMARRE: Mais ils peuvent, dans la mesure où ils prennent des décisions, par contre, faire des erreurs qui ont des conséquences non intentionnelles, de la même façon que ce qui est mis de l'avant par les gens qui aimeraient que le CRTC réglemente le moins possible ou n'émette pas de ligne directrice, ils disent: vos lignes directrices peuvent avoir des conséquences non intentionnelles.

5492   M. BÉLAND: Il y a une possibilité que les compagnies fassent des erreurs. C'est sûr.

5493   Peut-être que Vidéotron a déjà fait des erreurs dans ses choix de pratique de gestion, mais ce sont des erreurs que le marché va régler parce que s'il y a des compagnies qui font des erreurs pendant que leurs concurrents ne les font pas ou si deux compagnies, simultanément, font des erreurs, c'est la première qui va corriger l'erreur qui va avoir des clients plus satisfaits.

5494   Au fond, la notion que les compagnies pourraient collectivement aller dans un sens de dégrader inutilement le service rendu au consommateur, cette notion-là ou cette préoccupation-là va à l'encontre de toute notre réelle dans le marché.

5495   CONSEILLERE LAMARRE : Pour changer de propos, vous en avez parlé rapidement ce matin dans votre présentation, en ce qui concerne les services que vous rendez à vos clients de gros, les revendeurs, et la question d'impact sur la bande passante utilisée par les revendeurs sur la bande passante qui est utilisée par la titulaire qui fournit le service de base a été longuement discutée.

5496   Maintenant, vous, vous nous dites que vous n'appliquez que des mesures économiques de gestion de trafic. Est-ce que, présentement, c'est la même chose que vous faites avec vos clients de gros?

5497   M. BÉLAND : Oui. Dans notre tarif Accès Internet aux tierces parties, l'AITP, vous allez trouver dans ce tarif des frais de dépassement, des frais d'utilisation excédentaire qui sont identiques aux frais qu'on applique à nos propres utilisateurs finaux.

5498   Évidemment, on ne charge pas ces frais-là aux utilisateurs finaux des revendeurs. On les charge au revendeur, qui, lui, a le droit de faire ce qu'il veut avec, par la suite.

5499   Mais les frais sont identiques, et chaque fois qu'on modifie un de nos frais de dépassement ou un de nos seuils de dépassement pour nos utilisateurs finaux, on dépose un tarif avec le Conseil pour faire exactement le même changement, à la même date, dans notre tarif AITP.

5500   CONSEILLERE LAMARRE : Et ce que vous expliquiez plus tôt ce matin, c'est que, présentement, vous êtes à encourager vos revendeurs à instaurer le même système de compteur d'utilisation de bande passante pour leurs clients?

5501   M. BÉLAND : On leur donne accès au même compteur. C'est leur décision...

5502   CONSEILLERE LAMARRE : C'est leur décision, mais ils y ont accès.

5503   M. BÉLAND : ...quoi faire avec.

5504   CONSEILLERE LAMARRE : Ils y ont accès.

5505   Simplement pour m'assurer que j'ai bien compris ce que vous avez expliqué ce matin en ce qui concerne l'impact de la bande passante qui est utilisée par les revendeurs et l'ensemble de la bande passante de Vidéotron, est-ce que j'ai bien compris que la bande passante qui est fournie aux revendeurs, elle n'est pas isolée de la bande passante globale de Vidéotron?

5506   M. BÉLAND : Non, pas du tout. C'est l'accès local qui est l'endroit où la congestion va paraître le plus souvent dans notre réseau, puis la plupart des réseaux, j'imagine. L'accès local est un accès à une ressource partagée entre nos utilisateurs finaux et les utilisateurs finaux de nos revendeurs.

5507   CONSEILLERE LAMARRE : Mais est-ce qu'il y a une partie dans le réseau où est-ce que les bandes passantes sont effectivement isolées, pas nécessairement au niveau local, mais sur la portion principale du réseau?

5508   M. BÉLAND : A un certain point, bien sûr, le trafic est passé au revendeur. A certain point, il a son router qui est en communication avec notre router local. La bande passante... ou le trafic est passé au revendeur. A partir de ce moment-là, oui, c'est sur son réseau, c'est à lui à dimensionner son réseau. Donc, son réseau fédérateur, par exemple, c'est à lui à prendre les décisions de dimensionnement.

5509   Mais encore une fois, le point important de notre point de vue, puis on croit que ça devrait être le point important pour le Conseil aussi, c'est là où la congestion se trouve le plus souvent, c'est dans l'accès local, et c'est justement l'accès local qui est partagé entre l'ensemble des utilisateurs finaux.

5510   CONSEILLERE LAMARRE : Maintenant, brièvement, pour revenir sur la question des différents modèles économiques, des différents produits, au fond, que vous proposez à vos clients, présentement, vous mentionnez que vous avez six niveaux de services d'accès.

5511   Est-ce que ça serait possible pour vous de nous fournir les détails de ces services d'accès là que vous proposez à vos clients de détail?

5512   M. BÉLAND : Oui. C'est sur notre site web, mais on peut le packager pour vous.

5513   CONSEILLERE LAMARRE : Oui, s'il vous plaît.

5514   Et l'autre chose, c'est, de votre expérience et compte tenu justement du sondage que vous avez fait -- vous, vous avez déjà vu les détails des questions et des réponses -- est-ce que vous estimez qu'en ayant des mesures économiques et en fournissant à vos clients le choix du type de produit qu'ils peuvent choisir que vous réussissez à créer une équité, compte tenu des besoins de vos clients, ou est-ce que vous pensez qu'il y a de l'amélioration à faire?

5515   M. BÉLAND : Manifestement, l'équilibre existe, existe bien aujourd'hui. Les statistiques de satisfaction sont à l'appui à ça. Donc, ça va bien présentement. Nous, notre préoccupation, c'est de s'assurer qu'on ait, au futur, la même flexibilité de continuer à faire le choix judicieux entre les méthodes diverses pour maintenir la même satisfaction à la clientèle.

5516   CONSEILLERE LAMARRE : Sur la question de la vie privée, il y a une méthode -- que vous avez entendue certainement la semaine dernière -- qui semble causer des préoccupations plus qu'une autre, et c'est la question de l'inspection approfondie des packets.

5517   Je crois vous avoir entendu dire ce matin, et je le vois même dans votre réplique, que la distinction doit être faite au niveau de l'utilisation de l'information, dans la mesure où il n'y a pas d'historique de conserver, que ça ne devrait pas causer de problème. Je me rappelle aussi que c'est une méthode que, présentement, vous n'utilisez pas, mais vous continuez à dire que vous voulez avoir la flexibilité de l'utiliser éventuellement si ça devient nécessaire.

5518   Est-ce que je dois comprendre de votre propos que vous estimez que le fait de surveiller le type d'application que vos clients utilisent, ce n'est pas une atteinte à la vie privée dans la mesure où vous ne conservez pas l'information?

5519   M. BÉLAND : Oui. Le fait de regarder un packet avec une technologie ou une autre, de décider est-ce que ce packet est telle application ou une autre et de diriger le packet selon l'information fournie par la technologie, en soi, on ne voit aucun impact sur la vie privée.

5520   CONSEILLERE LAMARRE : Mais vous êtes conscient qu'il y a des gens qui ont une opinion contraire à la vôtre et que la notion de vie privée, ça demeure une notion aussi, dans une certaine mesure, qui peut être subjective.

5521   Donc, qu'est-ce que vous feriez, vous, dans l'éventualité où vous décidiez d'utiliser cette technique-là pour rassurer vos clients que, effectivement, vous ne portez pas atteinte à leur vie privée?

5522   M. BÉLAND : La façon de rassurer les clients, c'est de ne jamais toucher au contenu, et d'après tout ce que j'ai entendu dans cette audience depuis une semaine, je n'ai rien entendu dans les descriptions des pratiques utilisées par les autres fournisseurs actuellement, je n'ai rien entendu qui m'indique à moi qu'il y a des fournisseurs au Canada qui regardent le contenu. Donc, il n'y a pas d'atteinte à la vie privée. Il n'y a même pas de préoccupation dans ma tête.

5523   CONSEILLERE LAMARRE : Juste un dernier point. Je veux juste m'assurer que...

--- Pause

5524   CONSEILLERE LAMARRE : Non, c'est tout, Monsieur le Président. Merci, messieurs.

5525   THE CHAIRPERSON: Len?

5526   COMMISSIONER KATZ: Thank you, Mr. Chairman.

5527   Good afternoon. A couple of questions relating to your TPIA service. I have got a copy of your tariff in front of me here. I am sure you are familiar with it as well.

5528   Do you currently offer TPIA service to customers today?

5529   MR. BÉLAND: Yes.

5530   COMMISSIONER KATZ: You have live customers out there?

5531   MR. BÉLAND: Yes.

5532   COMMISSIONER KATZ: Can you distinguish their traffic from your retail customers' traffic on your network?

5533   MR. BÉLAND: Can we distinguish their traffic? What do you mean precisely?

5534   COMMISSIONER KATZ: Can you segregate and look at the load in the traffic that is coming onto your network from your wholesale customers' end users versus from your own retail customers?

5535   MR. BÉLAND: At a certain point, we have to hand off the traffic to the TPIA reseller. So on that level, we definitely break it out at some point in order to hand it off to the reseller.

5536   COMMISSIONER KATZ: Do you know whether your reseller sector of your business is using a disproportionate amount of traffic relative to the users on your retail side or not?

5537   MR. BÉLAND: I'll ask Pierre to comment.

5538   I suspect at some level there are certain measurement capabilities. Again, the simple fact that we charge excess use charges to our resellers for their end customers would indicate that we are measuring at some point the quantity of traffic but maybe Pierre can add to that.

5539   MR. ROY: You want to know what proportion -- if these third-party Internet users have any impact on the network? I just want to make sure I understand.

5540   COMMISSIONER KATZ: Yes. What I want to know is whether you know if -- for argument's sake, let's say you have 5 percent of your total customers coming from the resale sector, whether that 5 percent is using 5 percent of the network capacity or 25 percent of the network capacity.

5541   MR. ROY: In our traffic analysis, we look at it globally. If you asked a specific question, I would need to look at data to have this specific answer. But I have not seen any huge differences between both traffic because they are paying per usage and managing their bandwidth today.

5542   COMMISSIONER KATZ: Okay. Can I ask you though, when you come back to final reply if you can just take a look and just let us know, maybe in confidence if you are concerned about the confidentiality, as to whether there is a proportionality that is equivalent or not equivalent? So what percent of your customers are coming from the wholesale sector and how much capacity are they using up in the wholesale versus the retail?

5543   MR. BÉLAND: We will do our best to pull that together.

5544   COMMISSIONER KATZ: Okay.

5545   Now, you did say correctly -- I am sure it is correct -- that you are charging for the overage as well. So both your retail customers and your wholesale customers are paying if they go beyond the network.

5546   So theoretically -- and I am saying just theoretically now -- you do have sufficient financing to fund the growth in your network because you are charging people who use more than what your average is for your monthly charges to customers.

5547   So the issue really isn't a matter of having the money to build out the network because you are charging customers for that extra capacity, which translates into demand which you then build out.

5548   And I think I heard you say earlier that similar to Rogers, your planning horizon is about six months out. So you are building out for six months of demand, as well.

5549   So, theoretically, the only reason why you wouldn't be able to service the demand was if you underforecasted that demand, because, from a financial perspective, you shouldn't have any problem because you are charging for it.

5550   Is that correct?

5551   MR. BÉLAND: I don't have any specific data in front of me, but I would submit that the total amount of money that we collect from these access usage charges is far, far below what our annual capital expenditures are.

5552   Of course, money is money. It is a contribution to financing our capital investment, but I wouldn't make the direct link that you are making, that those charges allow us to keep building a network. Our investment in our network is very high, runs very strong, independent of any access use of revenue that we might be earning.

5553   COMMISSIONER KATZ: But your growth comes from two components, one is your existing customers' increased utilization, and the other is new customers that are coming on and paying for a new source of revenue for you, as well.

5554   So there are two components to that financing. I am just looking at that one component though; that is, the overage, so to speak, or the additional capacity utilized by those customers who are perhaps using more than what your average, or lanes of traffic, or however you measure your traffic, really is.

5555   I am just trying to understand what the reason would be that you wouldn't have enough capacity.

5556   And I understand that you are not doing any traffic management, as you said, but you reserve the right to be able to do it in the future, and I am trying to understand under what reasons would you actually engage in traffic management. The only reason I can see is if, in fact, you underforecast your demand, and suddenly there is a surge of demand because there are new applications, or whatever, that are using up capacity that you hadn't anticipated.

5557   MR. BÉLAND: I think the problem -- the difficulty I am having in responding is that the whole process of determining how much capital expenditure we are going to make -- it's not a uni-dimensional type of decision, as you are suggesting. You are balancing a lot of factors when you are making your capital investments, you are not just saying: Here are some access users, I got a little extra money from them, let's use that money to make sure that those excess bits are flowing well.

5558   Your capital budget is a whole, and you are trying to not just give some satisfaction to those access users, you are also trying to give some satisfaction to your entire customer base, which you are forecasting all along to be growing in its demand, and so on.

5559   You are also trying not to spend willy-nilly, you are trying to spend smartly.

5560   All of those factors come together in order to determine your capital budget. It's not a direct linkage between the amount of money we might get in access usage charges and --

5561   COMMISSIONER KATZ: No, and I understand that, as well. But, obviously, you are only going to build capacity if it is economically viable, and where that economics is through serving your existing customers, trying to reduce your churn, customers going somewhere else because someone may have a superior product or network, or whatever, as well.

5562   So, ultimately, you are making decisions to grow your network in order to serve your customers and provide a return to your shareholders, and all I am trying to understand is, why, in the future, would you not be able to meet the demand --

5563   One component would be economics, I would imagine. If suddenly the economy really went down, even further than it is today, and suddenly you started to say, "We can't spend capital, we will conserve capital," that may be one reason. But I don't think that is what you are saying to me. Therefore, I am trying to understand under what conditions would you start to ration or economize on the capacity that you have, and I can only think of one; that is, you underforecasted your demand -- which isn't a bad thing, necessarily, because you have customers that are out there, it's a matter of how fast can you spend the money to give them the service they want in order to serve your customers.

5564   MR. BÉLAND: But all along we also have an eye on the competitive marketplace, the prices in the marketplace. We are trying to offer the best possible service for the lowest possible price because of competitive market pressures.

5565   Maybe the problem I am having with your question is that you are portraying network management as something you do when there is a failure. Something went wrong. A forecast went wrong, or something else went wrong, you failed, go and do some management now.

5566   And that is not, in fact, how we see it. Network management and congestion management are good things in and of themselves, on an ongoing basis.

5567   For example, if we can deploy a new congestion management technique that allows us to save several tens of millions of dollars, because it's a real intelligent, innovative technique, and it allows us to save tens of millions of dollars of CAPEX that we wouldn't otherwise have saved, and therefore allows us to offer the same services at a cheaper price to our end users, that would be a good thing to do. And it's not because we failed in any way, it's in fact because our engineers were innovative enough to come up with some new ideas.

5568   COMMISSIONER KATZ: Okay. Those are my questions, Mr. Chairman.

5569   THE CHAIRPERSON: Can I take you back to page 7 of your presentation today?

5570   You say there, in the middle paragraph:

"On a shared network, when one end user or group of end users causes congestion on a particular facility, the impact is felt by all end users who use that facility. While it is the case that some facilities at some network locations may be under the control of resellers, the vast majority of local access facilities, at least in the case of coaxial networks, are not controlled by resellers, and hence escape fully from that responsibility." (As read)

5571   Explain this to me. Is there something special about coaxial cable that I don't understand?

5572   If you resell, presumably you sell a fixed quantity. You give them X, that's what they buy from you. And if they go above it, you have a system by which you overcharge.

5573   But how do the wholesalers, to whom you have sold -- your wholesale customers, how do they affect your network? That's the part --

5574   Don't you have a safety switch or something, that they can only go over the access capacity to a certain amount?

5575   Why would they necessarily affect your whole network?

5576   MR. BÉLAND: No, the TPIA resale model is not really one where you sell to resellers an amount of capacity. The resell model basically says to the reseller: Go out, find some end users, sign them up, and when you do sign them up, we will treat them just like our own end users, and then we will hook up your router to our router, and the traffic that comes from these people or is going to these people, we will pass it to you.

5577   THE CHAIRPERSON: I see, and you have no technical way of identifying the customers of the wholesalers on the network, and restrain them if they go over their amount?

5578   MR. BÉLAND: First of all, we can identify them, because we bill them, we are aware of precisely what addresses they are. That's the only way we could manage the network and manage the installation of their service, which we do conjointly with the reseller, et cetera.

5579   There is not a chunk of bandwidth set aside for them, they are just treated as our own end users are treated.

5580   Again, the key thing to remember is that the access network itself is shared. So in a moment of congestion, for example, in a particular cell, in a particular neighbourhood, their end users and our end users are all affected by that congestion. There is neither a preference given to ours or to theirs, they are all the same, they are all temporarily affected by that congestion, and they all go freely on their way once the congestion is over.

5581   THE CHAIRPERSON: Is that by necessity or by design?

5582   Could you design it so that it wouldn't --

5583   Could you avoid it so that the customers of your resellers, whom you tell me you can identify, could not contaminate or congest your network?

5584   MR. BÉLAND: It is the sort of thing that may be theoretically possible to do. We are not aware of it being done anywhere.

5585   We would be, also, quite concerned about any suggestion that it be done.

5586   If I go back to last week, to the testimony of the Coalition of Internet Service Providers, for example, who were raising the notion of what they called "wirespeed aggregation", what you need to realize is, despite the rational, engineering-sounding name, what they would basically be asking for is a free pass.

5587   The model, as I understood it presented to you, was to say that we would be obliged to give to our reseller an assurance that all of his end users could all be running at top speed, simultaneously, and that there would be no limitation placed on that; that the interconnection pipe we would have to give that reseller would be such that all of its end users could all run, simultaneously, 24 hours a day, and then the reseller would take care of managing the traffic after that.

5588   The problem is that, in a shared network context, by setting aside guaranteed bandwidth for a reseller, we would then be degrading the service to our own end users.

5589   Ironically, we would be setting up two classes of end users, first class reseller end users, and second class, our own end users, which is clearly unacceptable.

5590   THE CHAIRPERSON: Is this particular to TPIA, or does the same thing apply to the telcos?

5591   MR. BÉLAND: I am sure there are shared elements in a telco network. The degree of sharing may be more pronounced in a cableco network, but I couldn't really speak for the telco architecture.

5592   THE CHAIRPERSON: Okay. Thank you very much, those are our questions for you.

5593   We will take a five-minute break before we go on to the next item.

--- Suspension à 1435

--- Reprise à 1442

5594   THE CHAIRPERSON: Okay, let's go.

5595   THE SECRETARY: I would now invite Shaw Communications Inc. to make its presentation.

5596   Appearing for Shaw Communications is Ken Stein.

5597   Please introduce your colleagues, after which you will have 15 minutes for your presentation.

PRÉSENTATION

5598   MR. STEIN: Good afternoon.

5599   Thank you, Mr. Chairman and Commissioners. I am Ken Stein, Senior VP of Corporate and Regulatory Affairs for Shaw Communications Inc.

5600   With me today is Jean Brazeau, to my left, Senior VP of Regulatory Affairs. To his left is Dennis Steiger, Group Vice-President of Engineering, and Dean Shaikh, Director of Regulatory Affairs.

5601   And on my right is Jay Kerr-Wilson, our legal counsel.

5602   Behind we have Esther Snow, Manager of our Regulatory Affairs.

5603   We welcome this opportunity to inform the Commission and Canadians about our approach to managing traffic for the benefit of all of our customers.

5604   In our remarks today we will address the key issues identified by the Commission, and provide recommendations.

5605   We agree with the Commission's stated objective, to protect the interests of consumers and respect the ability of ISPs to effectively and efficiently manage our networks.

5606   These are not competing objectives. Our customers have always been our number one priority. This relentless focus on serving the needs of our customers drives us to constantly invest, innovate, launch new lines of business, and deliver exceptional customer service. In a highly competitive environment, we work hard to maximize customer loyalty and trust.

5607   Shaw has made significant investments to serve our customers. In the last ten years we have invested more than $5 billion to build our world-class broadband infrastructure. We have built a reliable and extensive network, comprised of 625,000 kilometres of fibre. In large and small communities across western Canada, we have upgraded plants, constructed new head ends, installed fibre, and completed node segmentation.

5608   All of these efforts are based on our need to become more efficient, enhance our services, and reach new customers, including customers in rural and remote areas.

5609   By the end of the year, DOCSIS 3.0 will be launched in all of our major centres, and Shaw communities will have the fastest internet speed available across Canada, at 100 megabits per second.

5610   As a result of our investments to improve the customer experience over the last ten years, we have grown our internet base to 1.6 million homes. At 70 percent, we have the highest basic cable/internet penetration rate in Canada, and in North America we are second only to Cablevision in New York City.

5611   Like other business strategies and investments, traffic management is about serving our customers and maintaining their trust and loyalty. Even with our significant investments to increase speed and capacity, we still experience network congestion challenges, especially as a result of peer-to-peer traffic, which, if left unmanaged, would consume all of the available capacity.

5612   Therefore, we must continue to combine investment with appropriate and necessary network management strategies. As a result of these efforts, we will maximize the freedom of all of our customers to use the internet for the creation and sharing of applications, as well as for information searches, communication, commercial activity, social networking, and entertainment.

5613   Traffic management is critical to providing internet service that is fast, reliable and affordable.

5614   The Telecommunications Act already prohibits ISPs from granting an undue preference or from interfering with the meaning of a communication. The existing regulatory framework is working effectively to protect consumers.

5615   Dennis...

5616   MR. STEIGER: Thank you, Ken.

5617   We agree with the Commission's first assumption, that unrestricted increases in internet traffic can lead to congestion in all or part of an ISP's network, and these periods of congestion may lead to deterioration of service for end users who are clients of that particular ISP.

5618   Congestion will most noticeably impact customers who use time-sensitive applications such as VoIP, instant messaging, video streaming and internet gaming.

5619   Our network management strategy is based on protecting the quality of service for all customers. If we did not deploy traffic management strategies to address network congestion, there would be a severe degradation in quality of service.

5620   In fact, we have tried it in the past, and the results were disastrous.

5621   As recently as February 2008, an internet chassis was without proper traffic shaping for over a month. The result was a major congestion problem, with a significant increase in customer complaints.

5622   We also support the Commission's second assumption, that certain internet traffic management practices may be appropriate for ISPs to use in order to maintain the integrity of their networks. ISPs need to maintain the ability to choose from among a variety of methods to control congestion.

5623   Because there is no one-size-fits-all approach, the Commission must allow each ISP to select the network management practices that are best suited for their particular network.

5624   Shaw uses DPI technology to shape upstream traffic, because this is the most effective and efficient measure to address the bandwidth consumption of peer-to-peer applications on our network.

5625   Although our traffic management devices operate 24 hours a day, the devices shape traffic only during periods of congestion. In these periods of congestion, the devices automatically detect peer-to-peer application and slow the upstream traffic.

5626   Traffic shaping is necessary to ensure that traffic does not exceed the amount of bandwidth allocated to peer-to-peer. When there is no congestion, allocation is not an issue. In periods of congestion, sufficient bandwidth is allocated for peer-to-peer applications to continue to operate. This approach ensures that sufficient bandwidth is available for other upstream traffic and real-time applications. The devices do not shape downstream traffic.

5627   The same practices are applied equally to retail and wholesale. Services to effectively and efficiently manage traffic for the benefit of all customers on a shared network. It is not feasible for wholesale traffic to be managed independently from retail traffic. If the traffic generated by wholesale end-users was left unmanaged, it would consume a disproportionate share of available capacity and significantly degrade network performance for all end-users.

5628   Shaw has an obligation, as well as specific permission in our TPIA Tariff to maintain the quality of service for all customers, both wholesale and retail.

5629   Jean...?

5630   MR. BRAZEAU: Thank you, Dennis.

5631   We submit that it is acceptable for individual ISPs to select their own network management strategy that may include a combination of approaches such as deep packet inspection, bandwidth limits, excess bandwidth usage charges, time of day pricing, caching, increased capacity and any other practices that do not breach either section 27(2) or section 36 of the Telecommunications Act.

5632   The current regulatory framework protects privacy and prohibits practices that block content, terminates communications or result in undue preference. There is no privacy concerns arising from Shaw's use of DPI technology to shape upstream peer-to-peer traffic.

5633   Our traffic shaping devices only analyze packet information to identify the type of traffic being transmitted. No customers or account-specific data is generated, stored or collected through the use of Shaw's DPI technology. The content of the packet is never examined and the packet information that is analyzed is not retained. Existing legislation protects the privacy of individuals who use the Internet.

5634   In response to the CRTC question about disclosure, Shaw submits that ISPs should only be required to disclose their practices to wholesale Internet access customers when changes would have a material and adverse effect on the operation of the competitive ISP.

5635   Shaw's traffic shaping practices are part of a comprehensive capacity management strategy that benefit both retail and wholesale customers.

5636   A final issue raised by the Commission is the analytical framework that the Commission should adopt.

5637   We suggest that the Commission's interpretation of section 36 should be based on a plain and ordinary meaning of the legislation. The section prohibits carriers from controlling the content or influencing the meaning or purpose of the telecommunications activity.

5638   Our use of DPI technology to shape upstream peer-to-peer traffic does not control the content of the communication. The content is provided by the source of the file and is selected by the recipient of the file with no interference or control by Shaw.

5639   DPI traffic shaping does not influence the meaning or the purpose of the communication. The file is transmitted as intended. The only effect of Shaw's traffic shaping solution is to allocate the amount of bandwidth available to peer-to-peer filesharing by slowing down the transmission rate. The file still arrives at its destination as intended and still carries with it whatever meaning or purpose it had when the transmission was initiated by the user.

5640   Because peer-to-peer files are not real-time services, restricting bandwidth does not alter or affect the purpose of the traffic.

5641   Ken...?

5642   MR. STEIN: Thank you.

5643   In conclusion, we believe that the current approach under the Telecommunications Act is consistent with the policy directive requiring the Commission to rely on market forces to the maximum extent feasible and to interfere with market forces to the minimum extent necessary.

5644   The retail ISP market in Canada is intensely competitive and no ISP operating in that market can afford to put itself at a competitive disadvantage by blocking customer access to content or rendering applications inoperable on their networks. Given the demonstrated ability of the market to constrain anti-consumer behaviour, any regulation would be unnecessary and could interfere with the efficient operation of that market.

5645   Parties who oppose the use of traffic management practices have raised entirely speculative concerns about potential ISP behaviour. They have presented no evidence of any actual problems.

5646   Maintaining the current approach of allowing reasonable network management will support the innovation and investment that are critical to Canada's global broadband leadership and competitiveness.

5647   Thank you very much.

5648   We look forward to answering your questions.

5649   THE CHAIRPERSON: Thank you.

5650   You say on page 4 that you manage upstream P2P traffic, but you do it on a 24/7 basis, but only when there is actual congestion.

5651   How do you define "congestion" first of all? Presumably you don't wait until there is congestion -- until there is a threat of congestion and then it comes in or what?

5652   MR. STEIGER: Effectively we can define "congestion" in a number of ways.

5653   As it applies to peer-to-peer traffic, we allocate a given amount of bandwidth per user and aggregate that onto an Internet chassis. When all of that bandwidth is being used, then we start to implement traffic management flow controls.

5654   THE CHAIRPERSON: Okay. Can you give us the details of that in writing, confidentially, if you must?

5655   MR. STEIGER: We can do that.

5656   THE CHAIRPERSON: Okay.

5657   Now, if I understand you correctly, you are different from Bell. Bell, in the CAIP application, suggested they do it during peak hours. Here you do it in effect all day long, but it only comes into effect if there is congestion or the threat of congestion. Presumably it gets turned off when that threat is diminished or the usage is below the maximum that you stipulated?

5658   MR. STEIGER: Yes, that's exactly correct. When there is no requirement to manage the traffic, at that time there is no flow controls put on the peer-to-peer traffic.

5659   Does your shaping gross model correspond to the peak hours?

5660   MR. STEIGER: There is a general correlation between engagement of traffic management flow control and peak hours, however it varies from region to region. There are going to be some areas where there is some variance from that, other areas it's going to be on longer during the day, sometimes less. Some customers will experience flow controls at all.

5661   THE CHAIRPERSON: Have you ever --

5662   MR. STEIN: I would just like to -- Mr. Chairman...?

5663   THE CHAIRPERSON: Sorry...?

5664   MR. STEIN: I would just like to point out, we operate in the summer across five time zones between Sault Ste. Marie and all a way to Victoria, and with Saskatchewan staying on standard time, so it makes it a challenge to identify exactly what the peak time period is in terms of this kind of activity.

5665   So that's why we look to do it more on a congestion basis. It's not easy to identify what a prime time would be given the time zones we serve.

5666   THE CHAIRPERSON: You heard me ask Rogers whether there is a way of dealing with uploading by way of over usage charges rather than through mechanical monitoring and what you are doing in shaping.

5667   Have you ever looked at that? Have you attempted it or something? I mean presumably it's not the users -- it doesn't get any benefit from the uploading that's happening, so if he had to pay for it presumably you would turn off the upload capacity.

5668   MR. STEIGER: We have talked about that extensively for a great number of years and for a number of reasons we have not yet implemented it. Certainly it is a tool that Videotron is obviously using to great success, it is not implemented in our network currently.

5669   There are other factors of market forces. Currently the competitors to Shaw do not do any usage-based billing so we are in the same situation as they are.

5670   THE CHAIRPERSON: Were you here on the first day when we had evidence from all sorts of people who said that actually detecting P2P traffic is very difficult. Encryption technology allows you to hide P2P traffic and so therefore you are causing all sorts of collateral damage or you are slowing down all sorts of P2P which is actually not the real culprit and the real culprit, because they are encrypted, escapes your detection.

5671   MR. STEIGER: We believe the signatures associated with detecting peer-to-peer traffic that's encrypted are highly accurate and if we are unsure of a particular flow pattern not matching that signature, then it's passed without restriction.

5672   THE CHAIRPERSON: And do you have any evidence that you are actually catching most of the peer-to-peer traffic??

5673   MR. STEIGER: We believe we could provide that.

5674   THE CHAIRPERSON: Okay.

5675   Len, you have some questions?

5676   COMMISSIONER KATZ: Yes. Thank you, Mr. Chairman.

5677   Good afternoon. I have a number of questions.

5678   Firstly in the general sense. Your IP network, does it compete as between your IP voice service, your managed services and your cable service as well as your ISP service or is the component that's public Internet distinct and not impacted at all by traffic from the other sources?

5679   MR. STEIGER: There is a separate network for the Internet services. It is segregated from the network we call Shaw Digital Phone, which is the voice network, as well as the video network.

5680   COMMISSIONER KATZ: So there is no contention as between them?

5681   MR. STEIGER: No, there is not.

5682   COMMISSIONER KATZ: And you don't fluctuate them based on volumes in demand?

5683   MR. STEIGER: No, we don't.

5684   COMMISSIONER KATZ: Okay. So it's fixed.

5685   Coming back to your proposal that ISPs select their own network traffic management strategy -- and you list on page 6 a number of them, some economic, some technical -- is there a prioritization you go through?

5686   Is there a guideline or a document that sort of says when we are coming up against contention and congestion here are the steps we take and they are in some sort of ascending or descending order or do you just do it on a case-by-case basis as the need arises, as the engineer or the traffic management operator feels comfortable?

5687   MR. STEIGER: We very much do have a criteria or process that we go through when we do anticipate or have congestion.

5688   Essentially, the bulk of the effort is around augmenting the network, adding capacity, adding channels, adding more chassis. That's the number one approach and that's what we spend about 98 percent of our time on.

5689   The second approach is to educate customers, to make them aware of over usage. Quite often the over usage that customers have, they are not aware because they may have viruses on their computer or they may be doing things that drive a lot of traffic that they are not familiar with.

5690   Lastly, we do apply traffic management principles, but traffic management principles are consistent, they never increase, they never become more aggressive than the standard that we have set.

5691   COMMISSIONER KATZ: Okay. You folks are a strong proponent of market forces and you say so in your final conclusion here as well, and yet for some reason I don't hear you saying let the market decide based on the economics of the business case.

5692   What you are saying is: Let us do what we feel is necessary to manage our network, which is not necessarily market driven, it's carrier driven, because people who are consuming aren't paying more and those that are not consuming paying less, which is something that is what the market would, you would assume, allow you to do.

5693   Can you explain why the market forces notion, the economic notion is not something you strive to achieve?

5694   MR. BRAZEAU: I beg to differ. I think what we are saying is that, you know, the customers -- because we operate in a competitive marketplace customers do have a choice. We try to manage the network in the most efficient manner possible in order to satisfy the demands for our customers and if they, for whatever reason, are unhappy with, you know, the methodology we are using in order to manage our network, they have the option to go to a different carrier. Some carriers do manage the network, some carriers do not manage their network so they have an option.

5695   So the market is working and the fact that we have 1.6 million Internet customers I think demonstrates that in general our customers are very happy with the service we are providing and the way we are providing our service.

5696   MR. STEIN: I would just like to add to that that making sure that we serve the total market in a competitive situation is exactly our objective, that what we want to do is to maximize the opportunities that are there.

5697   The problem is that if we tried to maximize the opportunities with peer-to-peer, that the prices we may have to charge in a congested environment may not match the kind of demand that would be there. So it's not just a -- it's really a problem in economics or in the business case, more than an economic situation, where the investment that we would make, would that be met by the kind of demand that would be there for the peer-to-peer.

5698   So at the present time we have focused on solving the congestion problem. Some of the other initiatives that people take don't solve the congestion, the congestion is still there.

5699   So what we are able to do right now is satisfy peer-to-peer users by shaping the system so that we can give them maximum use of the system at the time when the system is available to them.

5700   So it's very much a traffic sharing kind of plan that we developed and what we are trying to do is make sure that we are satisfying, to the extent that we can, all the customers that we have on the system. So that's what drives us in terms of dealing with that market.

5701   I mean we want to have more Internet customers, we want to have people using more bandwidth, but also we want to make sure that they are willing to pay the price that's associated with that. Just going to a peer-to-peer user and saying, you know, you can have whatever you want but you are going to pay $6000 a month, that's not going to happen.

5702   COMMISSIONER KATZ: No, but I would put to you that those that are consuming traffic at your peak more than others should pay a more proportionate share of the cost of that network.

5703   MR. STEIN: We doubt that they would pay the price. The price would be so excessive for using that kind of capacity at peak time they wouldn't pay it.

5704   COMMISSIONER KATZ: So then basically what you are saying is some of your customers are subsidizing other customers --

5705   MR. STEIN: No.

5706   COMMISSIONER KATZ:  -- at the end of the day --

5707   MR. STEIN: No, because it's --

5708   COMMISSIONER KATZ:  -- because you are in business to make money.

5709   MR. STEIN: No. It's a business case. We are not subsidizing -- nobody is subsidizing anybody. They are using -- the system is being shaped to take economic advantage of the system so that the value in the system -- in an uncomplicated way, we are trying to use the most simple technology we can and we are dealing with millions of pieces of information a day -- we are trying to use the simplest system we can, without having to go through all kinds of correlations or bandwidth limits or extra metering charges or that type of thing. So we are trying to keep it simple to satisfy that market.

5710   COMMISSIONER KATZ: Okay.

5711   To come back to something you said, Mr. Brazeau, a minute ago, your customers have choice and they can leave whenever they want if they feel they are not getting value for their money.

5712   Do you offer bundles of services where customers sort of lock in for three years or whatever on a plan?

5713   MR. BRAZEAU: We do not bind customers to any long-term contracts. We certainly have bundled products where you can buy Internet and telephony services and cable services, but none of them are bound by long-term contracts.

5714   COMMISSIONER KATZ: Okay.

5715   I think the Chairman asked this question but I was thinking of something else so I'm not sure I heard the answer.

5716   We heard last week that there are certain services out there that may be non-application specific but bandwidth hogs, congestion network encryption being one of them.

5717   How do you deal with the questionable ones I guess? Do you give them the benefit of the doubt and just let it go through without throttling or do you do what you need to do to protect your network and your customers and if some of them at the end of the day and up getting throttled, then it's a cost of doing business I guess?

5718   MR. STEIGER: We always err on the side of the customer. If we haven't clearly identified the signature as a peer-to-peer upstream during a period of congestion, there won't be any throttling applied.

5719   COMMISSIONER KATZ: There won't be a problem?

5720   MR. STEIGER: There won't be any throttling applied.

5721   COMMISSIONER KATZ: Okay.

5722   On page 5 of your comments this afternoon, you say in the last paragraph:

"It's not feasible for wholesale traffic to be managed independently from retail traffic." (As read)

5723   Do you have the statistics though? Independent of whether you can do it or not do you know what the traffic volumes are for your wholesale customers distinct from your retail customers?

5724   MR. STEIGER: We can provide that.

5725   COMMISSIONER KATZ: Okay.

5726   Do you know offhand if it's disproportionate or if it's proportionate?

5727   MR. STEIGER: We have never heard that it is disproportionate in any way, so I would have to -- my guess would be that it's very similar to the retail customers.

5728   COMMISSIONER KATZ: Okay. So there is no suggestion, at this point in time anyway, that's founded that the P2P users are more on the wholesale ISP provider's network than they are on your end-user network?

--- Pause

5729   MR. STEIGER: I think I understand your question.

5730   There is no differentiation between the retail and wholesale customers, they are subject to the same traffic management flows at all levels.

5731   COMMISSIONER KATZ: That wasn't my question though.

5732   My question was is there a disproportionate usage, not how are they subject to your traffic management practices.

5733   MR. BRAZEAU: The customers, TPI customers we have, to my knowledge offer -- they have no bandwidth limits or usage pricing applied to their services. So that would lead me to believe, although subject to check, that they could have heavier users than the average, our average customer profile. But then again, that would be subject to check.

5734   COMMISSIONER KATZ: Could you file, in your final submission, the proportion of your customers that come from your wholesale sector and also what percent of your traffic, total traffic, comes from that sector as well so that we can see that data?

5735   MR. STEIGER: We can find that.

5736   COMMISSIONER KATZ: As compared to the retail. So it's your retail versus your wholesale, customer base and usage base as well, to see if there's a proportionate or disproportionate amount?

5737   MR. STEIGER: We can break it -- yes.

5738   COMMISSIONER KATZ: Okay.

5739   At the bottom of page 6 you talk about a material and adverse affect on the operations of the competitive ISPs in terms of disclosure and you say you submit that you feel you should only be required to disclose when there is a material and adverse effect.

5740   I understand what an adverse effect is. I'm not sure how you define "materiality" and in whose context you define "materiality".

5741   Do you see us defining what material is or do you have a definition yourself as to what is material when you decide to disclose to your customers?

5742   MR. BRAZEAU: What we are suggesting is that we would make that decision. We view this very much similar to any network management innovation or changes that we implement in our network.

5743   Again, you know, the wholesale traffic is part of our own traffic and we want to make sure that that traffic would be handled in the most efficient and effective way possible. So if we think that there is a material change, then we would inform the wholesaler that, you know, the technique is being changed or a new tool is being implemented and then we would implement that tool.

5744   COMMISSIONER KATZ: Okay.

5745   Can I ask you again in your final submission to define "materialities", just so we know what it is from your perspective as well, because I think it's something at some point in time we are going to have to deal with. So I would prefer if you can tell us how you define "materiality" and when you would see yourself informing wholesale customers?

5746   MR. BRAZEAU: We will.

5747   COMMISSIONER KATZ: If I can take you to your submission of February 23, you haven't paragraph 11 a statement that I would like you to clarify for me. It says:

"Shaw submits that the Commission should not now put the significant social and economic benefits at risk by introducing an unnecessary regulatory regime that could distort the market, stifle innovation and investment and increase prices." (As read)

5748   Can you explain how innovation and investment would be stifled by putting together a framework -- and it's a framework that we talked about as part of this Public Notice, not rules and regulations, but a framework -- how you see that framework would in fact stifle innovation and investment?

5749   MR. STEIN: What we mean by that is that we have to respond to the market on a continuing basis and that regulatory regimes that require prior approval for initiatives and/or consideration of those generally aren't amenable to that response in that way.

5750   So, we believe that the current framework is the appropriate one and that it's the framework on which we are encouraged to make the investments that we make and that we are able -- and by innovation, we are able to try different technologies, different techniques, you know, that may be more effective.

5751   So, that is the basis on which we manage the system and we'd like to continue to manage the system that way. We think it's in the benefit of the system and of our consumers.

5752   COMMISSIONER KATZ: Okay.

5753   MR. BRAZEAU: Just to add. I mean, band width is by far the most scarce and valuable resource we have and it's also the most expensive to augment and, therefore, anything that has an impact or removes the management of that band width or the capacity from our hands just jeopardizes or makes our planning process more difficult, might require us to make more investment, and it's in that sort of mind set that we've made these remarks.

5754   COMMISSIONER KATZ: My last question. On that same submission of yours, paragraph 82 you say:

"Blocking content might..." (As read)

5755   COMMISSIONER KATZ: And you underline the word might:

"...breach section 36." (As read)

5756   COMMISSIONER KATZ: Can you tell me under what conditions it might not?

--- Pause

5757   MR. KERR-WILSON: Sir, I think the intent of the comment was, you don't know under what circumstances a network provider might block content.

5758   The example we've heard a lot of is Comcast, so that would be the example we would say that would offend section 36. But, for instance, to maybe legitimate public safety or legal reasons why a particular -- an ISP may be required to block particular content, and those would be the situations that wouldn't be an offence under 36 because they would either be required by law or some other public policy objective.

5759   COMMISSIONER KATZ: Okay. Could I ask you as well as part of your final submission to file with us what would be involved if you were required to follow the FCC edict on Comcast, what would you have to do, how long would it take to do and what are the implications of doing it as well?

5760   MR. BRAZEAU: Mr. Vice-Chair, you're suggesting if we implemented the Comcast solution?

5761   COMMISSIONER KATZ: Well, I think what happened there was there were complaints made to the FCC and the FCC basically said what you're doing is unduly discriminatory, fix it and make sure that you're application agnostic and Comcast found the solution that they found.

5762   What I want to understand is, what are the implications of that solution if it was imposed upon yourselves.

5763   MR. BRAZEAU: And you want this in our written submissions?

5764   THE CHAIRPERSON: Can I just elaborate. We heard from Rogers before you that Comcast engaged in something, session management, Rogers said we didn't so, therefore, it's no problem what we're doing, et cetera.

5765   I don't know. Are you engaged in session management?

5766   MR. STEIGER: No, we are not. We -- the process that Shaw employs in traffic management is one of queuing up packets, no packets are dropped or lost or altered in any way and they're only queued up during periods of congestion. As band width becomes available, the packets are released. It has the effect of slowing the traffic down without impairing it in any way.

5767   THE CHAIRPERSON: That means that the Comcast order would not be applicable to you because, as I understood it it prohibited, or told them to cease sessions management.

5768   MR. STEIGER: Our understanding is that Comcast was forging packets that were interrupting the session causing the client to re-start connections.

5769   That is a very aggressive, noticeable experience for the customer and we believe that's what the FCC had an issue with, not with traffic management so much.

5770   COMMISSIONER KATZ: But what they ultimately ended up with is something that was much more user and application agnostic.

5771   MR. BRAZEAU: But that is Comcast specific.

5772   COMMISSIONER KATZ: Yes.

5773   MR. BRAZEAU: There are other cable companies in the U.S. that do the same traffic management techniques that we use, so...

5774   COMMISSIONER KATZ: I understand that. And I think that Rogers mentioned that one of them was Cox, I guess.

5775   MR. BRAZEAU: That's right.

5776   COMMISSIONER KATZ: Yes. I just want to understand what the implications are.

5777   MR. KERR-WILSON: Sorry, Vice-Chairman Katz, just to clarify. You want Shaw to comment on the implications if it had to implement the Comcast solution or the FCC order, because I think as Rogers said this morning Comcast had other choices and they chose the one they did, but they didn't necessarily have to choose.

5778   So, I just want to understand what it is we're commenting on, the Comcast solution or the FCC order.

5779   COMMISSIONER KATZ: The Comcast solution.

5780   MR. KERR-WILSON: Okay.

5781   MR. STEIN: The only problem I have with that is we don't do what Comcast is doing.

5782   THE CHAIRPERSON: Len, you're asking them something that they don't do.

5783   COMMISSIONER KATZ: No, but they can take a look -- they know what Comcast did and what changes they made to their network, presumably.

5784   MR. STEIN: We don't agree with what Comcast did.

5785   COMMISSIONER KATZ: I understand that.

5786   MR. STEIN: You know, so what we're saying, we don't have a problem with the FCC order, but we didn't do what they did, so why would we comment on what they're now doing. We never did what they did.

5787   COMMISSIONER KATZ: The question that I raised is, what are the costs and the implications if you had to do it. Is it costly or is it not costly?

5788   I understand you don't feel it's necessary --

5789   MR. STEIN: It's zero cost because we don't do it.

5790   COMMISSIONER KATZ: Yes, but if you --

5791   MR. STEIN: Their solution?

5792   THE CHAIRPERSON: Let me ask the question differently?

5793   MR. STEIN: Why would we apply their solution to a problem that doesn't exist?

5794   THE CHAIRPERSON: You're doing P2P control right now.

5795   MR. STEIN: Pardon?

5796   THE CHAIRPERSON: You're doing P2P management right now.

5797   MR. STEIN: Yeah.

5798   THE CHAIRPERSON: Uploading management. If you were not allowed to do that, what else could you do? That's really what his question is driving at.

5799   What other solutions are there available and how economic or uneconomic are they?

5800   COMMISSIONER KATZ: Those are all my questions, Mr. Chairman.

5801   THE CHAIRPERSON: I presume that's --

5802   COMMISSIONER KATZ: Yeah.

5803   THE CHAIRPERSON:  -- the answer you wanted.

5804   MR. BRAZEAU: But also, in particular, what did -- the Comcast solution that they implemented in order to resolve their issue.

5805   COMMISSIONER KATZ: I'm assuming Comcast found the least intrusive to their operations in order to do it. I could be wrong, but I'm assuming what they did was most economical, most customer friendly, least costly to them because that's what a prudent business would do.

5806   And what I'm saying is, if they did that and my assumptions are correct, what would those implications be upon Shaw?

5807   THE CHAIRPERSON: Mr. Brazeau, for you, for Rogers, for Bell who's coming today, they all make the same point saying, you know, if upstream management is the most effective way of doing it and we have to do something economically or so it was very difficult in any way it would put us at a competitive disadvantage because we would be doing, others wouldn't be.

5808   Well, turn that around, well, if we ordered you to do that, you'd all have to find a different way of doing it.

5809   What are the ways that are available and how economic or uneconomic would they be? That's really what we're driving at.

5810   MR. BRAZEAU: We will address it in our final argument, sir.

5811   THE CHAIRPERSON: Thank you.

5812   Suzanne?

5813   COMMISSIONER LAMARRE: Merci, Monsieur le president.

QUESTIONS

5814   COMMISSIONER LAMARRE: Good afternoon. I have a few questions.

5815   In answering questions from Commissioner Katz I heard you say that you thought that whatever practices were put in place that if customers were not happy the marketplace would take care of it.

5816   Yet at the bottom of page 6 of your presentation you say that:

"Shaw submits that ISPs should only be required to disclose their practices to wholesale Internet access customers." (As read)

5817   COMMISSIONER LAMARRE: So, if you're denying your retail customers access to information about what type of traffic management practices you're putting in place, how are customers supposed to make an informed decision about the choice of providers they want to have?

5818   MR. BRAZEAU: Well, I think like most customers do on just about any product. I mean, they'll look at the quality of the product they're receiving for the price they're paying and then make a decision whether that's what they're -- you know, that's what they want or not and, if it's not, then they can go to Telus.

5819   COMMISSIONER LAMARRE: But on the numbers --

5820   MR. BRAZEAU: And they can buy a Telus service or they can, you know, or MTS or we heard very soon, you know, 3G from wireless service providers, so...

5821   COMMISSIONER LAMARRE: But if I'm a peer-to-peer user, the type of traffic management you're using has an effect. So, if I don't know you're actually using them or if anybody, you know, discloses the practice that they use, this is not an informed decision, this is not about marketplace; how can it be?

5822   A number of submissions that were tabled with the Commission dealt with concerns from consumers, consumer groups, different type of people about knowing what's going on with the traffic. So, that's part of the choice that people want to make.

5823   If you deny them that information, how can they do that?

5824   MR. STEIN: Well, I'll just make a couple of comments.

5825   First is that people do, in our markets, do comparisons day-by-day, right, it's part of the activity amongst Internet users comparing and it's, of course, in all the ads et cetera that, you know, my system can download faster than your system. You know, we use the snail kind of ads about criticizing our competitors and how slow they are and how fast we are.

5826   So, there's all those kind of comparisons and people make those comparisons all the time.

5827   Number two is that we don't have contracts. I mean, somebody can phone up today and say, you know, I'm switching over to another service.

5828   Third, there is a lot of speculation about things we could do and, you know, I think we do have to make it clear with people that we don't do those things.

5829   So, I think you're right on that point, that in terms of dealing with speculative issues we should do that.

5830   And yes, finally, I think we probably should do more in terms of informing our customers exactly how we do manage the system for their benefit.

5831   So, I think that you make good points on those, but -- that we should respond to our consumers, but it's a very competitive market out there and people do make choices every day.

5832   We think they're very well informed. We certainly -- I think we have over a thousand TSRs, technical service people across the country, and Dennis could give you some idea of the kind of discussions that they take place -- that take place.

5833   MR. STEIGER: I'd like to also add just one thing. The way that we've crafted the traffic management flow controls are actually designed to ensure that peer-to-peer traffic is not impacted.

5834   The only thing that we're -- we're actually taking an approach at guaranteeing minimum upstream during the periods of congestion. That minimum upstream that we're guaranteeing actually ensures that the downstream, which is the customer application, proceeds unimpeded.

5835   So, there's a subtle difference and I just wanted to clarify our position on the impact of our traffic management. It actually will improve the customer's experience.

5836   COMMISSIONER LAMARRE: Okay. Well, the point that I was trying to get across is that the type of practices that are in place is actually information that consumers want to know to make choice and I think, Mr. Stein, you have taken that point.

5837   On page 7 of your presentation, second paragraph you say:

"The content is..." (As read)

5838   COMMISSIONER LAMARRE: Again, talking about peer-to-peer, but I want to talk more about the issue of principle here.

"The content is provided by the source of the filing that is selected by the recipient of the file with no interference or control by Shaw." (As read)

5839   COMMISSIONER LAMARRE: Like, maybe my English is a little bit deficient here, but how is it that slowing down dramatically the transfer of a file does not equate to interference with the content?

5840   MR. STEIGER: Just expanding on my previous comment, this -- the only file that we're slowing the transmission down is the uploading from the customer's computer. It's not something they initiate, it's not something they control. They don't know where it's going, they don't know who's receiving it.

5841   It's a requirement for them to upload in order to participate in the download. What the customer actually chooses to do is download a file. For them to download they have to participate in the upload community, and that's part of the BitTorrent protocol, that particular file-sharing application.

5842   So, while we can restrict upstream to a certain degree, there isn't necessarily any impact on the downstream.

5843   COMMISSIONER LAMARRE: Well, I beg to differ that, you know, that they only choose to download. I think that, you know, consumers and Internet users are quite savvy with what they're doing. If they do make the choice to download and share, they do make the choice to upload also. But that's something else.

5844   Last question. You do state that for you peer-to-peer -- deep packet inspection does not raise any privacy concerns.

5845   Well, we've heard different from other people. So, for some people the type of inspection that is being done, the fact that you may monitor the applications that they are using, whether or not you use information otherwise, is a privacy infringement.

5846   So, how can you reassure your customers that you're minimizing that infringement?

5847   MR. STEIN: Thank you. We had a lot of debate about using the word concerns because we felt that under the Telecommunications Act and also under the Privacy -- Electronic Privacy Act, I forget the acronym for it all the time.

5848   COMMISSIONER LAMARRE: Yes.

5849   MR. STEIN: But under those Acts that in Canada we do have a very strong framework for what kind of privacy protection people can expect.

5850   And Shaw has always undertaken to protect that privacy right. So, we've always tried, even in the technologies we use, we have been sensitive to the privacy issue. We do have a privacy policy statement that's posted on our website. We do have a privacy representative who's a very senior official in our company and we respond to those issues on a day-by-day basis to make sure we deal with them.

5851   So, I think the way we express concern may not be the right way. Are we concerned about privacy of individuals? Yes, we are. We do think, however, that the measures that are in place legislatively and the measures that we are required to take as a company through that legislation are very strong protections of Canadians' privacy.

5852   And, you know, we've gone to court to fight fishing expeditions for people from the record industry, we've gone to court to fight for those things and we do believe that any information about a customer belongs to that customer and that we should not use it for purposes other than what they have consented to or that we require to manage the business consistent with the legislation.

5853   So, we are concerned about it but we feel the framework that's in place is the right framework to deal with those issues.

5854   COMMISSIONER LAMARRE: Thank you.

5855   Those are all my questions.

5856   Merci, monsieur le president.

5857   THE CHAIRPERSON: Thank you, Suzanne.

QUESTIONS

5858   COMMISSIONER DENTON: Gentlemen, I'm getting bored, so let's have a fight, or an agreement.

--- Rires

5859   MR. STEIN: No problem.

5860   COMMISSIONER DENTON: Yes, I know, I could follow your grand example.

5861   There seems to be a thing here that a bunch of people are coming reasonably to the conclusion that application-specific measures are appropriate for the management of networks. This is probably taken on the carrier side, even if they don't actually do it themselves.

5862   The Open Internet Coalition and others, CIPPIC, a lot of the scholars give way to the notion that this is wrong, that you need to achieve the same result perhaps but by a different method.

5863   And this seems to engage the question of, if you could get away with application-specific measures deliberately in some sort of way that was bad this would hand over the future of the Internet to carriers rather than to creators.

5864   So, that's the concern I think that lies behind the Open Internet Coalition and CIPPIC and others.

5865   Now, I'm not saying these ideas are irreconcilable, they may in fact be practically managed. So, are you sensitive to the concern that application-specific -- that the control of application-specific measures that you take -- I'll try this word again -- that the exercise of application-specific measures may give rise to legitimate concerns on the part of the people about the direction and future of the Internet and what do you have to tell them?

5866   MR. STEIN: Well, the first thing we say is that the Internet is a wonderful creature and that it's really invented itself. It really -- the technologies, the applications, the YouTubes, some of them have been -- is it Napster that almost destroyed our network, both from a legal point of view but also from a congestion point of view?

5867   So, we don't know what people are going to be able to do with the network. I remember when we first started with this I think 15 years ago and we started to develop our own content situations, I think in Richmond Hill we built a little village, we had these people with kind of Internet information sites, et cetera. Well, we got rid of that because we realized that wasn't anything we knew anything about, right.

5868   So, we really did focus on building a system. We made changes when we had relationships -- which I won't go into -- that tended to want to have regional centres, you know, we took steps to make our -- build our own e-mail centre with the largest e-mail centre in the world I think in Calgary because we felt that that was what we needed to do to serve our customers better.

5869   So, there were a lot of models along the way that we discarded and a lot of responses that we made to how people were using the Internet.

5870   I remember, you know, you may remember video when it was going to be -- you know, it was all about upstream marketing. Well, that was right but it was not the right technology.

5871   So, the digital technology and the Internet have really expanded those creative opportunities. So, yeah, we want to support the creators and the producers.

5872   Our only interest is in making sure that the system works. We have no -- like, Dennis doesn't go into the system and decide what's video and what's software and what's whatever it is, he has no interest in that, his total interest is in congestion and managing the traffic and trying to come sensible recommendations for the people in the company about what kind of investments to make.

5873   And so that's our total focus, is on making sure we build that system to support people.

The more creative opportunities there are, the more content there is, the better it is for us. So, we want to make sure that we're in a position to support that.

5874   And we don't want to interfere with that. You know, what somebody thinks is not the right kind of application usually turns out to be -- that assessment usually turns out to be wrong, all right.

5875   Like the kind of applications that win out will always surprise us, every six months there's another surprise about what applications are out there and what people want to do with the system and that's terrific for all of us.

5876   So, that's the kind of sense that we want -- kind of environment we want.

5877   So, I don't think that you've got competing problems here, I think that that's something that we can, you know, see as having the same kind of objective going forward.

5878   COMMISSIONER DENTON: I hear you, thank you.

5879   So then, peer-to-peer applications seem to, in their current form, generate a lot of congestion or they can generate a lot of congestion and problems for carriers, and if this is going to be rationally managed so as to deal with it on a congestion basis, is there a way of finding -- is there a way of solving this problem without affecting the right of creators to create these kinds of applications?

5880   MR. STEIN: I enjoy a good fight too.

5881   The point that I think we would like to make is that we're in no way restricting anybody's ability to develop, build, deploy new technologies that spur on the growth of the Internet.

5882   We are actually doing quite the opposite of that. We're not focusing our traffic management on restricting peer-to-peer, that's not the purpose of what we're doing. The purpose of what we're doing in traffic management is to enable all the other protocols to flow in a reasonable manner.

5883   Currently we allow up to 30 percent of the upstream band width to be consumed by peer-to-peer and that's only generated by smaller than 10 percent of the population.

5884   So, we give it actually a disproportionate amount of network band width.

5885   So, my position would be we're giving peer-to-peer a bigger slice of the pie than it probably should have based on the number of users that use it.

5886   The implementation we have also guarantees the minimum band width at peer-to-peer application at about 80kb per second.

5887   So, every customer on the network is going to get at least 80kb per second, even under extreme congestion to operate their peer-to-peer.

5888   If we don't put these restrictions in place what we'll find is that all the real-time protocols start to break down, peer-to-peer itself starts to break down and the ability for customers to access anything on the Internet becomes progressively difficult.

5889   That would be our position.

5890   COMMISSIONER DENTON: Great. You know, fair enough.

5891   Next question. In view of the data that has been presented by Professor Odlyzko and others, it was the notion that the growth of traffic on the Internet has been significantly slower than might have been expected a decade ago and that the ability of carriers to keep up with the growth of traffic is -- that there is such an ability and that the growth of the traffic is not as dangerous or as explosive as once thought it would be.

5892   I would like to hear your views on the question of the relationship of the growth of traffic and your ability to deploy resources to handle it.

5893   MR. STEIGER: The growth of the traffic varies from year to year. Having been involved in the Shaw product for over a dozen years now, there are times when it's doubled every year, tripled every year. Right now it's growing at about 50 percent a year, but with the amount of customers that we have right now that's growing at 50 GB a second per year, which is a tremendous amount of growth for us to manage.

5894   If it continues to grow at that rate, it's possible we might be able to keep up with the network augmentation requirements, but things change.

5895   We didn't predict that video downloading and sharing would become the predominant file type five years ago.

5896   The bulk of what the Internet is doing today is carrying around video and we can't predict what the next big pressure on traffic growth will be five years from now. Traffic management systems allow us to be proactive and keep our network running during an unprecedented period of growth.

5897   COMMISSIONER DENTON: In the balance between appropriate economic incentives, that is to say prices for usage, and traffic management, can you give some sort of rough proportion as to what you think you need? What is the rough relative importance of, say, appropriate prices versus traffic management in appropriately controlling the usage?

5898   MR. STEIGER: We try to balance off the pricing of the product to keep it competitive, to keep our client base growing. Exactly the same way, we try to balance off the use of traffic management.

5899   We have tried traffic management at many different levels. We have experimented in different ways over the years. The mechanism we are using right now results in virtually no customer complaints. I am not aware of any recent customer complaints on anything related to traffic management, by a Shaw customer, restricting their application.

5900   So we have to balance product pricing with the way we use traffic management to make sure that we grow every year.

5901   COMMISSIONER DENTON: Is pricing as important as traffic management? Is one 20 percent, the other 80 percent? How do you estimate roughly the proportion of -- what controls it best, pricing or traffic management?

5902   MR. STEIGER: As customers aren't really aware of our traffic management policies or --

5903   COMMISSIONER DENTON: No, I am just talking from the network management point of view.

5904   MR. STEIGER: Yes. From the network management point of view, pricing is more important than anything we do with traffic management.

5905   COMMISSIONER DENTON: Okay, fair enough. Those are my questions. Thank you very much.

5906   THE CHAIRPERSON: Candice?

5907   COMMISSIONER MOLNAR: Thank you.

5908   I would like to begin by talking about your traffic management practice. You said that you monitor 24 hours a day and it takes action on a dynamic basis as congestion is detected.

5909   Is that more expensive as a traffic management or a congestion management approach than if you were to put in hard rules as to the time of day or otherwise?

5910   MR. STEIGER: We don't think that there would be a cost difference for us to implement with our technology. We can't speak to the technologies that other ISPs use to manage their traffic, however.

5911   COMMISSIONER MOLNAR: Okay, thank you.

5912   Rogers, who was here this morning, said that putting in place a dynamic congestion management approach results in an unpredictable customer experience.

5913   Do you have comments on that? I mean I just find it quite interesting that two of the large coaxial cable networks both throttle only on the upload. One suggests it is inappropriate to do it dynamically because it is an unpredictable customer experience. In your view, you must see something different. So let me know that, please.

5914   MR. STEIGER: We don't believe that our customers experience any difference in their normal applications as a result of the traffic management. So whether it is on part of the day or all day, we don't believe that they see the difference.

5915   COMMISSIONER MOLNAR: They don't see the difference or they don't understand that the difference is caused by traffic management practices?

5916   MR. STEIGER: We don't believe they see the difference. We don't believe that when it is on versus off they are aware that it is on or off because it would have no impact on them. I mean they wouldn't -- most of the customer complaints that one gets are not about -- they wouldn't see any variation.

5917   So it is not that they don't know that we are doing the traffic management but they don't notice a difference. Hopefully, they wouldn't notice a difference from day to day or from hour to hour as to how they are getting their downloads. They wouldn't see that as being a difference. They would hopefully get the same speed.

5918   That is our primary objective, is to make sure that their experience on a continuum is equal across a whole period of time. So the only thing that varies is the upstream.

5919   COMMISSIONER MOLNAR: Okay. I think I understand that.

5920   And on the upstream, if I heard correctly, I want to ensure I understand this correctly, did I hear you say that when there is congestion and your tools are in place that P2P can be throttled back to 80 kilobits per second?

5921   MR. STEIGER: 80 kilobits per second is the guaranteed minimum bandwidth that we provide under the most congested circumstances. That ensures that peer-to-peer is able to flow relatively normally and at the same time allows all the other non-peer-to-peer applications to work.

5922   COMMISSIONER MOLNAR: And is that 80 kilobits over all your different pricing plans? I see in your different pricing plans you have some with 2-megabit uploads, some with 5 megabits. Is it 80 kilobits across all your pricing plans?

5923   MR. STEIGER: We don't differentiate by the plan the customer has.

5924   COMMISSIONER MOLNAR: Okay.

5925   You already had a discussion with Commissioner Lamarre about what you disclose to your retail customers and what potentially should be disclosed to them in order that they can make competitive decisions between different service providers.

5926   I just want to ask you about a particular suggestion that came in front of us by a party who suggested that ISPs as well as advertising their available speeds, available upload and available upload, also be required when they throttle to advertise their throttled speeds.

5927   Do you have any comment on that as means of full customer disclosure?

5928   MR. BRAZEAU: I will try. I think the general feeling we have is that even if we did, I don't think it would be very useful information for the customer to have. Most of the uploads are going to customers around the world and it is not what really the customer -- it is not really the characteristic that he is looking for in this product.

5929   What they are looking for is download speeds and QFS and customer service. Those are the measures that they use in order to determine which ISP they will buy a service from, and the throttling of peer-to-peer traffic is not an issue that really concerns them. It might concern a handful of customers but it is only a handful of customers.

5930   COMMISSIONER MOLNAR: And if three years from now, with different traffic experience, different traffic conditions, you needed to begin to throttle download or other elements of your network traffic, would you view that should be something that is disclosed to customers?

5931   I mean we are deciding here what we think our customers -- what is and is not of interest to the customer base.

5932   MR. BRAZEAU: Well, that will affect directly the quality of service the customer really perceives and so I think then the customer would need to decide whether he wants to remain a Shaw customer or not.

5933   COMMISSIONER MOLNAR: So it should be made aware to them?

5934   MR. BRAZEAU: It will be made aware to them by their use of the service.

5935   COMMISSIONER MOLNAR: Okay.

5936   Before I end, there is one thing to be made aware upon your use of the service once you have made a commitment to a service provider and there's another to have the information in order to select a service provider.

5937   MR. BRAZEAU: I think we don't disagree with that. I don't think this is a big issue for us.

5938   COMMISSIONER MOLNAR: Yes.

5939   MR. BRAZEAU: It is just if you -- you know, human nature being human nature, if you make that information available to customers, what we are concerned is we will get a lot of calls from customers saying, well, you know, I tried to download this movie and I couldn't download it, when it has nothing to do with throttling.

5940   So you are creating issues in the minds of the consumers that were created by providing this bit of information where they don't quite understand what it means. So it is more in that context.

5941   But I don't think it is a major concern for us that we would make the technology and the speeds that we are using to throttle peer-to-peer, if we make that available on our website. I don't think that is a big issue for us.

5942   COMMISSIONER MOLNAR: Okay, thank you.

5943   MR. STEIN: I will just make two comments.

5944   The first one is as an automobile racing fan, in my view, throttling means increasing speed, and secondly, our interest as cable Internet suppliers is to increase the speed and the number of customers who take that. So the Nitro offering at 150 megabits per second, which is just incredible speed, you know, I think our objective is much more to increase the downstream capability, not to go the other route.

5945   COMMISSIONER MOLNAR: Okay, thank you. Those are my questions.

5946   THE CHAIRPERSON: Thank you.

5947   You were here when I questioned Videotron before you and I asked them about a statement that they made that the excessive use of P2P by some of their wholesale customers would in effect create congestion in their network and they could not control that or sort of limit them to the capacity being sold them. You heard the explanation they gave.

5948   Does the same apply on your network?

5949   MR. STEIGER: If I recall correctly, their response was in regard to the shared nature of the network.

5950   THE CHAIRPERSON: Yes.

5951   MR. STEIGER: We have a very similar network that is also shared.

5952   THE CHAIRPERSON: I see.

5953   And when you say that you slow down P2P, presumably there are some P2Ps that are time-sensitive and you can segregate those out? Like Skype, et cetera, you don't slow that down?

5954   MR. STEIGER: No, we don't. We don't slow down any time-sensitive applications or protocols.

5955   THE CHAIRPERSON: But isn't Skype a P2P? I have heard here at this hearing it is. I am not a technician.

5956   MR. STEIGER: It falls into the general family but that would not be one of the applications that we would slow down.

5957   THE CHAIRPERSON: Okay. Put the other way around, how do you know whether something is time-sensitive or not?

5958   MR. STEIGER: We have a group of engineers that dedicate their lives to figuring this stuff out and it changes almost daily what protocols become popular in the network. A year ago nobody heard of Twitter. Today everyone is talking about Twitter. So we try to stay up on that as best we can.

5959   THE CHAIRPERSON: But presumably you don't do that on a live basis, you program the computer to do that, so that must be the characteristics of a program or do you actually -- how does it know, for instance, not to slow down Skype, to take an example?

5960   MR. STEIGER: We can't accidentally slow down a real-time application because we explicitly add to the list the applications that we traffic manage.

5961   THE CHAIRPERSON: Okay, fine. Thank you, those are our questions for you.

5962   In light of the hour of the day, we will break now because we have no translators after a certain hour and we want to give Bell the interrogation that it deserves given that they started this whole proceeding.

5963   So we will start tomorrow morning at 8:30.

5964   Thank you.

--- L'audience est ajournée à 1549, pour reprendre le mardi 14 juillet 2009 à 0830

   STÉNOGRAPHES

____________________      ____________________

Johanne Morin         Jean Desaulniers

____________________      ____________________

Sue Villeneuve         Beverley Dillabough

____________________      ____________________

Monique Mahoney         Madeleine Matte

Date de modification :