SE4C03: Computer Networks and Computer Security Last revised: April Name: Nicholas Lake Student Number: For: S.

Size: px
Start display at page:

Download "SE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S."

Transcription

1 BitTorrent Technology How and why it works SE4C03: Computer Networks and Computer Security Last revised: April Name: Nicholas Lake Student Number: For: S. Kartik Krishnan

2 1 Abstract BitTorrent Technology How and why it works The BitTorrent (Torrent) file distribution system is a P2P (peer 2 peer) network that has swept over the internet within the last year. It is so popular that at the moment BitTorrent accounts for almost 35% of all internet traffic and more then 50% of all P2P network traffic. These are staggering numbers considering BitTorrent was developed by Bram Cohen and debut at CodeCon in 2002! However, aside from its popularity BitTorrent has its enemies and rather large enemies at that. They stem from the fact that although BitTorrent was developed essentially to distribute legitimate content, it enables the users to distribute copyrighted material on a massive scale. Thus, with the type of traffic the BitTorrent technology produces you can see why its adversaries include the likes of music and movie industries. Justly, BitTorrent technology and websites that host.torrent files and Trackers are being sued faster then the technology's download rates! BitTorrent Technology The BitTorrent client works by seeking to find Pareto efficiency 1. This according to BitTorrents inventor Bram Cohen, essentially means that the software is trying to create a local optimization algorithm. Pairs of counterparties see if they can improve their lot together, which tend to lead to global optima. The BitTorrent clients main difference from other P2P technologies is that it actively tracks a list of peers that are sharing or downloading a specific file, while other clients work by finding a user with the desired file on their computer. There are four critical elements in a BitTorrent network (Torrent); Trackers.torrent file Seeds Leechers The Tracker is the only part that is not shared in the Torrent node, rather it actively keeps track of all seeders and leechers downloading a given.torrent file. This group of seed and leechers is called the peer set. There is only one.torrent file for each shared content. The.torrent file holds all information about the file to be downloaded; name, size, checksum, and IP address of the Tracker. Seeds are nodes in the Torrent that have complete copies of the desired content. This number starts at 1 and grows exponentially as the file gets more popular and more people have finished downloading. Leechers are nodes in the Torrent ring that have incomplete copies. To download a file, one simply downloads the.torrent file and loads it into a BitTorrent application. If the file is a newly shared, there is only 1one seed and the cost of this is born solely on the original host. But as the file gets more popular and is distributed among a growing amount of connected leechers, the cost is shifted from the host and is distributed among the lechers. This 1 An economic allocation is inefficient if there is an alternative allocation in which all agents are better off in terms of their own objective functions (utilities, profits, payoffs); it is said to be Pareto efficient if there is none such alternative allocation

3 2 makes hosting a file, with unlimited number of downloads, affordable. Once a leecher is complete they are promoted to seeds and will remain on the network solely as an uploading node until they have closed there connection. A prime example of how this works is described in Jeremy Reyes paper, Cutting Edge Peer-to-Peer File Sharing: BitTorrent " Host A seeds a file that can be arbitrarily divided into 10 data "chunks." Leecher X joins the Torrent and downloads chunks [1,2,3]. Leecher Y then joins the Torrent and instead of connecting to A to get chunks [1,2,3], Y will connect to X and download the chunks from him, while X continues to download from A receiving chunk [4]. While downloading content from X, Y may download a single chunk [5] from A that X does have yet. Y would then share this chunk to X, and X would respond by sharing new chunks it downloaded from A, to Y. Further along in the lifetime of this Torrent yet another leecher may come along and download from the current leechers who have partial datasets before attempting to retrieve non-replicated data from the original seed." The first picture below shows what a normal P2P network looks like (direct download, ftp ect). While the seconds shows what a BitTorrent network would look like. *Normal Network *BitTorrent Network Key feature From the example above this inter-leeching sharing is a key feature to BitTorrent success. It thrives on the algorithm that choose who to download from and which files(parts) to start with when downloading.torrent file. Since order does not matter, files (parts) are downloaded from different sections of a file and are placed in order to create a working file (The BitTorrents actually breaks down piece into sub-piece as to improve the downloading rate). How BitTorrent does this is called, "piece selection" which has four main parts: Strict Priority is a BitTorrent policy that once a sub-piece is selected the remaining sub-pieces from a particular piece are downloaded before any other subpieces can be requested. Next Random First Piece entails that once a user connects to the.torrent, it chooses a random piece in order to get the user into the Torrent ring as soon as possible. Rarest First, is implemented after the user has one completed piece of the file, this allows a user to have a piece that other peers want so uploading can be done

4 3 to as many peers as possible. Endgame Mode is implemented because when a user request a sub-piece it may transfer very slow, which in the middle of a download is not a problem, but at the end of a download can be a burden. Thus, nearing the end of a download sub-pieces of the file are actively being requested to ensure fast download rates. Once a sub-piece connection is made, the request is cancelled. Finally since Endgame Mode is usually a very short period at the end of the download, very little bandwidth is wasted this way. Reason for its popularity One of the best reasons for its popularity is the fact that for a host, the cost is considerably low. A host is usually in a metered bandwidth environment, in which there are charges for bandwidth use, server crashes and other problems that arise from a file being downloaded by many peers at the same time from their website. BitTorrent changes this by allotting the cost to the users who usually download from a non-metered bandwidth environment. Basically, BitTorrent allows peers to cooperate in order for the success of scalable and robust distribution of files. It allows those who get a host's file to tap into their upload capacity to give the file to others at the same time. Those that provide the most to others get the best treatment in return. On the user side, one sees the benefit of helping others. As you download a file you are instantly uploading to others so instead of only downloading from peers that have a complete file, you are downloading from everyone in the Torrent ring. This conceivably is a utopian world. This cooperative distribution grows almost without limits, since each new participant brings not only demand but also supply. And since each user brings a new resource to the Torrent ring, you get a limitless scalability for a nearly fixed cost. There are numerous website that host Trackers and.torrent files so users can find each other and start the Torrent ring. This makes finding the BitTorrent file you seek quite easy, and with the abundance of BitTorrent applications that organize your torrent files, the technology has never been easier to use. But with great power come great responsibility, and many of these websites are falling under fire from those that feel their utopian society cause more harm then good. Conclusion In December the Motion Picture Association of America (MPAA) filed a suit against websites that served as a hub for BitTorrent seekers. The reason being that a lot of the BitTorrent content is copyrighted DVD s. The MMPA feels that by targeting major BitTorrent website they can stifle the BitTorrent community. But once again this falls into a grey area, because MPAA want to get rid of BitTorrent technology all together. Many believe that this suit is reminiscent to those filed against the VCR in which the VCR was allowed to continue since its initial purpose was not for illegal use. Thus one could argue that BitTorrent initial purpose was not for copyrighted material distribution, but considering more than half of the BitTorrent files are illegal it may be hard to keep this seed growing.

5 4 References Cohen, Bram. BitTorrent Economics Paper. World Wide Web, May Dessent, Brian. Brian's BitTorrent FAQ and Guide, World Wide Web, May Mennecke,Thomas. BitTorrent Remains Powerhouse Network. World Wide Web, January Ryes,Jeremy. Cutting Edge Peer-to-Peer File Sharing: BitTorrent. World Wide Web, February

The BitTorrent Protocol

The BitTorrent Protocol The BitTorrent Protocol Taken from http://www.cs.uiowa.edu/~ghosh/bittorrent.ppt What is BitTorrent? Efficient content distribution system using file swarming. Usually does not perform all the functions

More information

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390 The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May

More information

Incentives Build Robustness in BitTorrent

Incentives Build Robustness in BitTorrent Incentives Build Robustness in BitTorrent Bram Cohen bram@bitconjurer.org May 22, 2003 Abstract The BitTorrent file distribution system uses tit-fortat as a method of seeking pareto efficiency. It achieves

More information

Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe

Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe Chapter 2: Initial (real world) systems Thorsten Strufe 1 Chapter Outline Overview of (previously) deployed P2P systems in 3 areas P2P file sharing and content distribution: Napster, Gnutella, KaZaA, BitTorrent

More information

Lecture 6 Content Distribution and BitTorrent

Lecture 6 Content Distribution and BitTorrent ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Lecture 6 Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent

More information

The Bittorrent P2P File-sharing System: Measurements And Analysis J.A. Pouwelse, P. Garbacki, D.H.J. Epema, H.J. Sips Department of Computer Science,

The Bittorrent P2P File-sharing System: Measurements And Analysis J.A. Pouwelse, P. Garbacki, D.H.J. Epema, H.J. Sips Department of Computer Science, The Bittorrent P2P File-sharing System: Measurements And Analysis J.A. Pouwelse, P. Garbacki, D.H.J. Epema, H.J. Sips Department of Computer Science, Delft University of Technology, the Netherlands BitTorrent

More information

Java Bit Torrent Client

Java Bit Torrent Client Java Bit Torrent Client Hemapani Perera, Eran Chinthaka {hperera, echintha}@cs.indiana.edu Computer Science Department Indiana University Introduction World-wide-web, WWW, is designed to access and download

More information

BitTorrent Peer To Peer File Sharing

BitTorrent Peer To Peer File Sharing BitTorrent Peer To Peer File Sharing CS290F: Networking for Multimedia Mini PhD Major Area Exam I) Introduction Content distribution is an important topic in networking and has been evolving from the start

More information

P2P File Sharing: BitTorrent in Detail

P2P File Sharing: BitTorrent in Detail ELT-53206 Peer-to-Peer Networks P2P File Sharing: BitTorrent in Detail Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering mathieu.devos@tut.fi TG406 2

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

More information

Seminar RVS MC-FTP (Multicast File Transfer Protocol): Simulation and Comparison with BitTorrent

Seminar RVS MC-FTP (Multicast File Transfer Protocol): Simulation and Comparison with BitTorrent Seminar RVS MC-FTP (Multicast File Transfer Protocol): Simulation and Comparison with BitTorrent Dominic Papritz Universität Bern Overview > Related work > MC-FTP > BitTorrent > Future work > References

More information

P2P: centralized directory (Napster s Approach)

P2P: centralized directory (Napster s Approach) P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application

More information

Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack

Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Jurand Nogiec University of Illinois Fausto Paredes University of Illinois Joana Trindade University of Illinois 1. Introduction BitTorrent

More information

Peer-to-peer filetransfer protocols and IPv6. János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004

Peer-to-peer filetransfer protocols and IPv6. János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004 -to-peer filetransfer protocols and IPv6 János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004 Motivation IPv6 traffic is

More information

Peer-to-Peer Data Management

Peer-to-Peer Data Management Peer-to-Peer Data Management Wolf-Tilo Balke Sascha Tönnies Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 11. Content Distribution 1. Reliability in Distributed

More information

Attacking a Swarm with a Band of Liars evaluating the impact of attacks on BitTorrent

Attacking a Swarm with a Band of Liars evaluating the impact of attacks on BitTorrent Attacking a Swarm with a Band of Liars evaluating the impact of attacks on BitTorrent Marlom A. Konrath, Marinho P. Barcellos, Rodrigo B. Mansilha PIPCA Programa de Pós-Graduação em Computação Aplicada

More information

DDoS Vulnerability Analysis of Bittorrent Protocol

DDoS Vulnerability Analysis of Bittorrent Protocol DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia kcsia@cs.ucla.edu Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number

More information

MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with

MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent RVS Seminar HS 2007 MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent Alican

More information

A Week in the Life of the Most Popular BitTorrent Swarms

A Week in the Life of the Most Popular BitTorrent Swarms A Week in the Life of the Most Popular BitTorrent Swarms Mark Scanlon, Alan Hannaway and Mohand-Tahar Kechadi 1 UCD Centre for Cybercrime Investigation, School of Computer Science & Informatics, University

More information

CS5412: TORRENTS AND TIT-FOR-TAT

CS5412: TORRENTS AND TIT-FOR-TAT 1 CS5412: TORRENTS AND TIT-FOR-TAT Lecture VI Ken Birman BitTorrent 2 Today we ll be focusing on BitTorrent The technology really has three aspects A standard tht BitTorrent client systems follow Some

More information

Modeling an Agent-Based Decentralized File Sharing Network

Modeling an Agent-Based Decentralized File Sharing Network Modeling an Agent-Based Decentralized File Sharing Network Alex Gonopolskiy Benjamin Nash December 18, 2007 Abstract In this paper we propose a distributed file sharing network model. We take inspiration

More information

The Algorithm of Sharing Incomplete Data in Decentralized P2P

The Algorithm of Sharing Incomplete Data in Decentralized P2P IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 2007 149 The Algorithm of Sharing Incomplete Data in Decentralized P2P Jin-Wook Seo, Dong-Kyun Kim, Hyun-Chul Kim,

More information

Computers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA

Computers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA Computers and Media: P2P and Business Models CSCI 1200 JAREK SZLICHTA CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA 1 Agenda difference between client-server and peer-to-peer technology business models used

More information

P2P Node Setup Guide Authored by: Unitsa Sungket, Prince of Songkla University, Thailand Darran Nathan, APBioNet

P2P Node Setup Guide Authored by: Unitsa Sungket, Prince of Songkla University, Thailand Darran Nathan, APBioNet Automatic Synchronization and Distribution of Biological Databases and Software over Low-Bandwidth Networks among Developing Countries P2P Node Setup Guide Authored by: Unitsa Sungket, Prince of Songkla

More information

Lab 5: BitTorrent Client Implementation

Lab 5: BitTorrent Client Implementation Lab 5: BitTorrent Client Implementation Due: Nov. 30th at 11:59 PM Milestone: Nov. 19th during Lab Overview In this lab, you and your lab parterner will develop a basic BitTorrent client that can, at minimal,

More information

The Internet is Flat: A brief history of networking over the next ten years. Don Towsley UMass - Amherst

The Internet is Flat: A brief history of networking over the next ten years. Don Towsley UMass - Amherst The Internet is Flat: A brief history of networking over the next ten years Don Towsley UMass - Amherst 1 What does flat mean? The World Is Flat. A Brief History of the Twenty-First Century, Thomas Friedman

More information

CNT5106C Project Description

CNT5106C Project Description Last Updated: 1/30/2015 12:48 PM CNT5106C Project Description Project Overview In this project, you are asked to write a P2P file sharing software similar to BitTorrent. You can complete the project in

More information

Delft University of Technology Parallel and Distributed Systems Report Series. The Peer-to-Peer Trace Archive: Design and Comparative Trace Analysis

Delft University of Technology Parallel and Distributed Systems Report Series. The Peer-to-Peer Trace Archive: Design and Comparative Trace Analysis Delft University of Technology Parallel and Distributed Systems Report Series The Peer-to-Peer Trace Archive: Design and Comparative Trace Analysis Boxun Zhang, Alexandru Iosup, and Dick Epema {B.Zhang,A.Iosup,D.H.J.Epema}@tudelft.nl

More information

Improving Deployability of Peer-assisted CDN Platform with Incentive

Improving Deployability of Peer-assisted CDN Platform with Incentive Improving Deployability of Peer-assisted CDN Platform with Incentive GLOBECOM 2009 Dec 2, 2009 Tatsuya Mori, Noriaki Kamiyama, Shigeaki Harada, Haruhisa Hasegawa, and Ryoichi Kawahara NTT Service Integration

More information

Should Internet Service Providers Fear Peer-Assisted Content Distribution?

Should Internet Service Providers Fear Peer-Assisted Content Distribution? Should Internet Service Providers Fear Peer-Assisted Content Distribution? Thomas Karagiannis, UC Riverside Pablo Rodriguez, Microsoft Research Cambridge Konstantina Papagiannaki, Intel Research Cambridge

More information

The Challenges of Stopping Illegal Peer-to-Peer File Sharing

The Challenges of Stopping Illegal Peer-to-Peer File Sharing The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:

More information

CGHub Client Security Guide Documentation

CGHub Client Security Guide Documentation CGHub Client Security Guide Documentation Release 3.1 University of California, Santa Cruz April 16, 2014 CONTENTS 1 Abstract 1 2 GeneTorrent: a secure, client/server BitTorrent 2 2.1 GeneTorrent protocols.....................................

More information

A Comparison of Mobile Peer-to-peer File-sharing Clients

A Comparison of Mobile Peer-to-peer File-sharing Clients 1. ABSTRACT A Comparison of Mobile Peer-to-peer File-sharing Clients Imre Kelényi 1, Péter Ekler 1, Bertalan Forstner 2 PHD Students 1, Assistant Professor 2 Budapest University of Technology and Economics

More information

CSCI-1680 CDN & P2P Chen Avin

CSCI-1680 CDN & P2P Chen Avin CSCI-1680 CDN & P2P Chen Avin Based partly on lecture notes by Scott Shenker and John Jannotti androdrigo Fonseca And Computer Networking: A Top Down Approach - 6th edition Last time DNS & DHT Today: P2P

More information

How To Test The Speed Of Bittorrent On A Bitt Client And Torrent On A Pc Or Ipad (For Free) On A Microsoft Flash Get 2.5 (For A Free) Computer (For Pc Or Mac) On An Ip

How To Test The Speed Of Bittorrent On A Bitt Client And Torrent On A Pc Or Ipad (For Free) On A Microsoft Flash Get 2.5 (For A Free) Computer (For Pc Or Mac) On An Ip Zhicheng Yang, yangzhicheng@wustl.edu (A paper written under the guidance of Prof. Raj Jain) Download The file distribution protocol BitTorrent(BT) is very popular nowadays, and people are used to sharing

More information

From Centralization to Distribution: A Comparison of File Sharing Protocols

From Centralization to Distribution: A Comparison of File Sharing Protocols From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015

More information

Peer to Peer File Sharing and Copyright Infringement Policy

Peer to Peer File Sharing and Copyright Infringement Policy Peer to Peer File Sharing and Copyright Infringement Policy Overview The abuse of network resources to illegally obtain and distribute media or software, through peer to peer (P2P) networks, or direct

More information

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT Soumya V L 1 and Anirban Basu 2 1 Dept of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, India

More information

PEER TO PEER FILE SHARING USING NETWORK CODING

PEER TO PEER FILE SHARING USING NETWORK CODING PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering

More information

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009 HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer

More information

INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST

INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST THE NATIONAL CENTER FOR JUSTICE AND THE RULE OF LAW AND THE NATIONAL JUDICIAL COLLEGE INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST Thank you for participating in our live webcast.

More information

Multi-torrent: a performance study and applications. Yan Yang*, Alix L.H. Chow and Leana Golubchik. Int. J. Advanced Media and Communication, Vol.

Multi-torrent: a performance study and applications. Yan Yang*, Alix L.H. Chow and Leana Golubchik. Int. J. Advanced Media and Communication, Vol. Int. J. Advanced Media and Communication, Vol. Multi-torrent: a performance study and applications Yan Yang*, Alix L.H. Chow and Leana Golubchik Department of Computer Science, University of Southern California,

More information

A Study on the novel tool to retort P2P security issues

A Study on the novel tool to retort P2P security issues 보안공학연구논문지 (Journal of Security Engineering), 제 5권 제 2 호, 2008년 4월 A Study on the novel tool to retort P2P security issues Martin Drahansky 1) Abstract The term File Sharing is the sharing of computer data

More information

Multimedia transmission in a managed P2P network: making sense?

Multimedia transmission in a managed P2P network: making sense? Multimedia transmission in a managed P2P network: making sense? L. Xu 1, A. Ksentini 2, K. Singh 1, G. Rubino 1, G. Straub 3, Y. L Azou 4 1 INRIA Rennes - Bretagne Atlantique, Rennes, France; 2 IRISA-University

More information

The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public

The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com Introduction Well understood facts: o Fast is better than slow but it costs more to be fast o Network has to be fast and

More information

A Lightweight Model for Mobile Peer-to-Peer File Sharing Systems

A Lightweight Model for Mobile Peer-to-Peer File Sharing Systems JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, VOL. 1, NO. 2, MAY 2010 67 A Lightweight Model for Mobile Peer-to-Peer File Sharing Systems G. Stephan, B. Traboulsi, R. Dbouk, and S. Sharafeddine Department

More information

Executive Brief for Sharing Sites & Digital Content Providers. Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits

Executive Brief for Sharing Sites & Digital Content Providers. Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits Executive Brief for Sharing Sites & Digital Content Providers Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits Executive Summary The Opportunity/Challenge The revenue

More information

ResNet Guide. Information & Learning Services. Here to support your study and research

ResNet Guide. Information & Learning Services. Here to support your study and research ResNet Guide Information & Learning Services Here to support your study and research ResNet Quick Start Guide In order to get you on-line and enjoying the service as quickly and as painlessly as possible,

More information

Unit 3 - Advanced Internet Architectures

Unit 3 - Advanced Internet Architectures Unit 3 - Advanced Internet Architectures Carlos Borrego Iglesias, Sergi Robles Carlos.Borrego@uab.cat,Sergi.Robles@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma

More information

Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems

Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems (Scalable and Efficient Keyword Searching) Anh-Tuan Gai INRIA Rocquencourt anh-tuan.gai@inria.fr Laurent Viennot INRIA Rocquencourt

More information

The Impact of Background Network Traffic on Foreground Network Traffic

The Impact of Background Network Traffic on Foreground Network Traffic The Impact of Background Network Traffic on Foreground Network Traffic George Nychis Information Networking Institute Carnegie Mellon University gnychis@cmu.edu Daniel R. Licata Computer Science Department

More information

Three short case studies

Three short case studies Three short case studies peer to peer networking wireless systems search engines each includes issues of hardware processors, storage, peripherals, networks,... representation of information, analog vs.

More information

Case 1:15-cv-02739-WYD-MEH Document 1 Filed 12/17/15 USDC Colorado Page 1 of 11 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO

Case 1:15-cv-02739-WYD-MEH Document 1 Filed 12/17/15 USDC Colorado Page 1 of 11 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO Case 1:15-cv-02739-WYD-MEH Document 1 Filed 12/17/15 USDC Colorado Page 1 of 11 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO Civil Action No. CLEAR SKIES NEVADA, LLC, a Nevada Limited

More information

apt-p2p: A Peer-to-Peer Distribution System for Software Package Releases and Updates

apt-p2p: A Peer-to-Peer Distribution System for Software Package Releases and Updates apt-p2p: A Peer-to-Peer Distribution System for Software Package Releases and Updates authors: Cameron Dale, Jiangchuan Liu presented by: Cameron Dale Simon Fraser University Burnaby, BC, Canada camerond@cs.sfu.ca

More information

University of Würzburg, Institute of Computer Science, Research Report Series

University of Würzburg, Institute of Computer Science, Research Report Series University of Würzburg Institute of Computer Science Research Report Series Investigation of chunk selection strategies in peer-assisted video-on-demand systems Tobias Hoßfeld, Simon Oechsner, Frank Lehrieder,

More information

Performance Modeling of BitTorrent Peer-to-Peer File Sharing Networks

Performance Modeling of BitTorrent Peer-to-Peer File Sharing Networks Performance Modeling of BitTorrent Peer-to-Peer File Sharing Networks Kunjie Xu Graduate Telecommunications and Networking Program School of Information Science University of Pittsburgh Abstract BitTorrent

More information

Improving the Speed of Peer to Peer Backup Systems with BitTorrent WORCESTER POLYTECHNIC INSTITUTE

Improving the Speed of Peer to Peer Backup Systems with BitTorrent WORCESTER POLYTECHNIC INSTITUTE A Major Qualifying Project Report ON Improving the Speed of Peer to Peer Backup Systems with BitTorrent Submitted to the Faculty of WORCESTER POLYTECHNIC INSTITUTE In Partial Fulfillment of the Requirement

More information

BITSTALKER: ACCURATELY AND EFFICIENTLY MONITORING BITTORRENT TRAFFIC

BITSTALKER: ACCURATELY AND EFFICIENTLY MONITORING BITTORRENT TRAFFIC BITSTALKER: ACCURATELY AND EFFICIENTLY MONITORING BITTORRENT TRAFFIC Kevin Bauer, Damon McCoy, Dirk Grunwald, and Douglas Sicker University of Colorado, Boulder, CO, USA {bauerk, mccoyd, grunwald, sicker}@colorado.edu

More information

Energy Adaptive Mechanism for P2P File Sharing Protocols

Energy Adaptive Mechanism for P2P File Sharing Protocols Energy Adaptive Mechanism for P2P File Sharing Protocols Mayank Raj 1, Krishna Kant 2, and Sajal K. Das 1 1 Center for Research in Wireless Mobility and Networking (CReWMaN), Department of Computer Science

More information

A Torrent Recommender based on DHT Crawling

A Torrent Recommender based on DHT Crawling Distributed Computing A Torrent Recommender based on DHT Crawling Bachelor Thesis Julian Fuchs fuchsju@ethz.ch Distributed Computing Group Computer Engineering and Networks Laboratory ETH Zürich Supervisors:

More information

Virtual Private Network Using Peer-to-Peer Techniques

Virtual Private Network Using Peer-to-Peer Techniques Virtual Private Network Using Peer-to-Peer Techniques Peer-to-Peer VPN Daniel Kasza Massachusetts Academy of Math and Science Abstract The low performance of traditional, client-server model based, virtual

More information

BitTorrent File Sharing in Mobile Ad-hoc Networks

BitTorrent File Sharing in Mobile Ad-hoc Networks BitTorrent File Sharing in Mobile Ad-hoc Networks Gábor Balázsfalvi University of Debrecen, Hungary János Sztrik University of Debrecen, Hungary September 29, 2006 Abstract This paper presents an application

More information

N6Lookup( title ) Client

N6Lookup( title ) Client CS 640: Introduction Networks AdityaAkella Peer-to-Peer Lecture 24 -to Computer p2p Uses Downloading: Searching Centralized Flooding Smarter Routing file of sharing p2p The (Freenet, (Gnutella, flooding

More information

INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315

INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315 INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315 The Digital Millennium Copyright Act (DMCA) and Peer-to-Peer File Sharing Policy Copying, distributing, and downloading copyrighted materials, including

More information

loss-tolerant and time sensitive loss-intolerant and time sensitive loss-intolerant and time insensitive

loss-tolerant and time sensitive loss-intolerant and time sensitive loss-intolerant and time insensitive CS326e Quiz 5 The first correct 10 answers will be worth 1 point each. Each subsequent correct answer will be worth 0.2 points. Circle the correct answer. UTEID The transfer of an html file from one host

More information

Torrage: A Secure BitTorrent based Peer-to-Peer Distributed Storage System

Torrage: A Secure BitTorrent based Peer-to-Peer Distributed Storage System Torrage: A Secure BitTorrent based Peer-to-Peer Distributed Storage System Debarghya Das Cornell University, Ithaca, NY 14850 dd367@cornell.edu Abstract Most cloud storage platforms today offer a centralized

More information

3. Some of the technical measures presently under consideration are methods of traffic shaping, namely bandwidth capping and bandwidth shaping 2.

3. Some of the technical measures presently under consideration are methods of traffic shaping, namely bandwidth capping and bandwidth shaping 2. THE IDENTIFIED EMERGING POLICY RESPONSES 1. INSERT Traffic shaping 2. The UK Parliament is presently considering introducing technical measures to tackle the problem of unlawful peer-to-peer (P2P) file-sharing.

More information

Towards Cloud Streaming: architecture, mechanism and deployments

Towards Cloud Streaming: architecture, mechanism and deployments outline Towards Cloud Streaming: architecture, mechanism and deployments IETF-78, Clouds bar BoF, July 2010 Xiaogang Wei (arojoy@forcetech.net) Lisa Dewar (lisamariedewar@googlemail.com) About ForceTech

More information

Searching for Malware in BitTorrent

Searching for Malware in BitTorrent Searching for Malware in BitTorrent Andrew D. Berns and Eunjin (EJ) Jung April 24, 2008 Abstract One of the most widely publicized aspects of computer security has been the presence and propagation of

More information

Professor Yashar Ganjali Department of Computer Science University of Toronto. yganjali@cs.toronto.edu http://www.cs.toronto.

Professor Yashar Ganjali Department of Computer Science University of Toronto. yganjali@cs.toronto.edu http://www.cs.toronto. Professor Yashar Ganjali Department of Computer Science University of Toronto yganjali@cs.toronto.edu http://www.cs.toronto.edu/~yganjali Announcements Programming assignment 2 Extended Deadline: Fri.

More information

Copyright Compliance and Peer-to-Peer File Sharing Policy

Copyright Compliance and Peer-to-Peer File Sharing Policy University of Scranton Division of Information Resources Copyright Compliance and Peer-to-Peer File Sharing Policy Executive Sponsor: Sr Vice President for Finance and Administration Responsible Office:

More information

Skirting ISP Traffic Shaping in P2P Systems, and Countermeasures

Skirting ISP Traffic Shaping in P2P Systems, and Countermeasures Distributed Computing Skirting ISP Traffic Shaping in P2P Systems, and Countermeasures Bachelor s Thesis Pascal Studerus studi@student.ethz.ch Distributed Computing Group Computer Engineering and Networks

More information

Network Management through BitTorrent Blocking and Bandwidth Shaping by ISPs

Network Management through BitTorrent Blocking and Bandwidth Shaping by ISPs Network Management through BitTorrent Blocking and Bandwidth Shaping by ISPs Gerard Van Wijk Department of Computer Science University of Minnesota, Morris Morris, MN 56267 vanw0067@morris.umn.edu ABSTRACT

More information

Peer-to-Peer Networks Fast Download 11th Week

Peer-to-Peer Networks Fast Download 11th Week Peer-to-Peer Networks Fast Download 11th Week Department of Computer Science Summer 28 Mittwoch, 9. Juli 28 1 Peer to Peer Networks Fast Download 2 Mittwoch, 9. Juli 28 2 IP Multicast Motivation Transmission

More information

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar

More information

Regulatory Impact Statement - Review of the Mobile Exclusion from the Three Notice Regime under the Copyright Act 1994

Regulatory Impact Statement - Review of the Mobile Exclusion from the Three Notice Regime under the Copyright Act 1994 In Confidence Regulatory Impact Statement - Review of the Mobile Exclusion from the Three Notice Regime under the Copyright Act 1994 Agency Disclosure Statement This regulatory impact statement has been

More information

Case 1:16-cv-00670-WJM Document 1 Filed 03/22/16 USDC Colorado Page 1 of 12 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO

Case 1:16-cv-00670-WJM Document 1 Filed 03/22/16 USDC Colorado Page 1 of 12 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO Case 1:16-cv-00670-WJM Document 1 Filed 03/22/16 USDC Colorado Page 1 of 12 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO Civil Action No. FATHERS & DAUGHTERS NEVADA, LLC, a Nevada Limited

More information

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used? TYPES OF TECHNOLOGY Peer to Peer Networking Networks in which computers are equal partners using common file sharing programs that allow users to connect directly to each other s computer hard drive to

More information

Peer-to-peer networking with BitTorrent

Peer-to-peer networking with BitTorrent Peer-to-peer networking with BitTorrent Jahn Arne Johnsen jahnarne@stud.ntnu.no Lars Erik Karlsen larserka@stud.ntnu.no Sebjørn Sæther Birkeland sebjorns@stud.ntnu.no Department of Telematics, NTNU - December

More information

Modeling and Analysis of Bandwidth-Inhomogeneous Swarms in BitTorrent

Modeling and Analysis of Bandwidth-Inhomogeneous Swarms in BitTorrent IEEE P2P'9 - Sept. 9-, 29 Modeling and Analysis of Bandwidth-Inhomogeneous Swarms in BitTorrent M. Meulpolder, J.A. Pouwelse, D.H.J. Epema, H.J. Sips Parallel and Distributed Systems Group Department of

More information

Combatting the threat of cyber and P2P sharing to the economic stability of post-industrial nations

Combatting the threat of cyber and P2P sharing to the economic stability of post-industrial nations Beijing Model United Nations 2015 XXII Forum: Issue: General Assembly Third Committee Combatting the threat of cyber and P2P sharing to the economic stability of post-industrial nations Student Officer:

More information

Proceedings of the Federated Conference on Computer Science and Information Systems pp. 737 741

Proceedings of the Federated Conference on Computer Science and Information Systems pp. 737 741 Proceedings of the Federated Conference on Computer Science and Information Systems pp. 737 741 ISBN 978-83-60810-22-4 DCFMS: A Chunk-Based Distributed File System for Supporting Multimedia Communication

More information

Technical report: An Estimate of Infringing Use of the Internet

Technical report: An Estimate of Infringing Use of the Internet Technical report: An Estimate of Infringing Use of the Internet January 2011 Version 1.8 Envisional Ltd, Betjeman House, 104 Hills Road, Cambridge, CB2 1LQ Telephone: +44 1223 372 400 www.envisional.com

More information

Peer-to-Peer Networks

Peer-to-Peer Networks Peer-to-Peer Networks Chapter 1: Introduction Jussi Kangasharju Chapter Outline Course outline and practical matters Peer-to-peer (P2P) overview Definition of P2P What is P2P and how it is different from

More information

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Peer-to-Peer Networks 02: Napster & Gnutella Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Napster Shawn (Napster) Fanning - published 1999 his beta

More information

The Value of a Content Delivery Network

The Value of a Content Delivery Network September 2010 White Paper The Value of a Content Delivery Network Table of Contents Introduction... 3 Performance... 3 The Second Generation of CDNs... 6 Conclusion... 7 About NTT America... 8 Introduction

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

Advanced Application-Level Crawling Technique for Popular Filesharing Systems

Advanced Application-Level Crawling Technique for Popular Filesharing Systems Advanced Application-Level Crawling Technique for Popular Filesharing Systems Ivan Dedinski and Hermann de Meer University of Passau, Faculty of Computer Science and Mathematics 94030 Passau, Germany {dedinski,

More information

How To Make A Game Of Gnutella A Cooperative Game

How To Make A Game Of Gnutella A Cooperative Game CS 186 Lecture 3 P2P File-Sharing David C. Parkes Sven Seuken September 1, 2011 Imagine you need to distribute a software patch to 10 Million users. What s an efficient way for doing so? If you are using

More information

Network Coding for Large Scale Content Distribution

Network Coding for Large Scale Content Distribution Network Coding for Large Scale Content Distribution Christos Gkantsidis College of Computing Georgia Institute of Technology Atlanta, GA, 30332, USA Email: gantsich@cc.gatech.edu IEEE Infocom 2005 Pablo

More information

Revisiting P2P content sharing in wireless ad hoc networks

Revisiting P2P content sharing in wireless ad hoc networks Revisiting P2P content sharing in wireless ad hoc networks Mohamed Karim SBAI, Chadi BARAKAT EPI Planète, INRIA, France Email: {mksbai, cbarakat}@sophia.inria.fr Abstract. Classical content sharing applications

More information

Is Content Publishing in BitTorrent Altruistic or Profit-Driven?

Is Content Publishing in BitTorrent Altruistic or Profit-Driven? Is Content Publishing in BitTorrent Altruistic or Profit-Driven? Ruben Cuevas Univ. Carlos III de Madrid rcuevas@it.uc3m.es Sebastian Kaune TU Darmstadt kaune@kom.tu-darmstadt.de Michal Kryczka Institute

More information

LIVE VIDEO STREAMING USING ANDROID

LIVE VIDEO STREAMING USING ANDROID LIVE VIDEO STREAMING USING ANDROID Dharini Chhajed 1, Shivani Rajput 2 and Sneha Kumari 3 1,2,3 Department of Electronics Engineering, Padmashree Dr. D. Y. Patil Institute of Engineering and Technology,

More information

Choosing the right Internet solution for your business.

Choosing the right Internet solution for your business. Choosing the right Internet solution for your business. Choosing the right Internet solution for your business. Let s face it, when it comes to the Internet it s all about speed and reliability. Slow connections

More information

Case 2:16-cv-00928-APG-GWF Document 1 Filed 04/24/16 Page 1 of 12

Case 2:16-cv-00928-APG-GWF Document 1 Filed 04/24/16 Page 1 of 12 Case :-cv-00-apg-gwf Document Filed 0// Page of CHARLES C. RAINEY, ESQ. Nevada Bar No. chaz@raineylegal.com RAINEY LEGAL GROUP, PLLC 0 W. Martin Avenue, Second Floor Las Vegas, Nevada +.0..0 (ph +... (fax

More information

Traffic Localization for DHT-based BitTorrent networks

Traffic Localization for DHT-based BitTorrent networks Traffic Localization for DHT-based BitTorrent networks Moritz Steiner and Matteo Varvello 1 OUTLINE Motivation DHT Traffic Localization DHT Traffic Localization in Action! Evaluation Conclusion Motivation

More information

An apparatus for P2P classification in Netflow traces

An apparatus for P2P classification in Netflow traces An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA

More information

Experiment of network services invocation in the Orange testbed The CINA interface

Experiment of network services invocation in the Orange testbed The CINA interface Experiment of network services invocation in the Orange testbed The CINA interface Bertrand Mathieu, Irène Grosclaude, Pierre Paris Orange Labs bertrand2.mathieu@orange.com Workshop «Optimisation of Network

More information

PEER-TO-PEER FILE SHARING POLICY

PEER-TO-PEER FILE SHARING POLICY 1.0 Overview The purpose of this Policy is to detail the University s plans to effectively combat the unauthorized distribution of copyrighted material by users of the Information Technology Resources,

More information

D3S A Distributed Storage Service

D3S A Distributed Storage Service D3S A Distributed Storage Service Rui Pedro Lopes and Pedro Sernadela Abstract The Internet growth allowed an explosion of service provision in the cloud. The cloud paradigm dictates the users information

More information