How To Analyse The Edonkey 2000 File Sharing Network
|
|
|
- Gyles Pitts
- 5 years ago
- Views:
Transcription
1 The edonkey File-Sharing Network Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf Steinmetz Multimedia Kommunikation (KOM) Technische Universität Darmstadt Merckstr. 25, Darmstadt (heckmann, bock, mauthe, Abstract: The edonkey 2000 file-sharing network is one of the most successful peerto-peer file-sharing applications, especially in Germany. The network itself is a hybrid peer-to-peer network with client applications running on the end-system that are connected to a distributed network of dedicated servers. In this paper we describe the edonkey protocol and measurement results on network/transport layer and application layer that were made with the client software and with an open-source edonkey server we extended for these measurements. 1 Motivation and Introduction Most of the traffic in the network of access and backbone Internet service providers (ISPs) is generated by peer-to-peer (P2P) file-sharing applications [San03]. These applications are typically bandwidth greedy and generate more long-lived TCP flows than the WWW traffic that was dominating the Internet traffic before the P2P applications. To understand the influence of these applications and the characteristics of the traffic they produce and their impact on network design, capacity expansion, traffic engineering and shaping, it is important to empirically analyse the dominant file-sharing applications. The edonkey file-sharing protocol is one of these file-sharing protocols. It is implemented by the original edonkey2000 client [edonkey] and additionally by some opensource clients like mldonkey [mldonkey] and emule [emule]. According to [San03] it is with 52% of the generated file-sharing traffic the most successful P2P file-sharing network in Germany, even more successful than the FastTrack protocol used by the P2P client KaZaa [KaZaa] that comes to 44% of the traffic. Contrary to other P2P file-sharing applications like Gnutella that are widely discussed in literature the edonkey protocol is not well analysed yet. In this paper, we shed light on this protocol with a measurement study. In the next section we describe the protocol itself. In Section 3 our measurements are presented. They were made with the emule client software and with an open-source edonkey server we extended for the purpose of this paper. The results of the measurements are presented in Section 4 before we give a summary and draw the conclusions. 224
2 2 Protocol Description The edonkey network is a decentral hybrid peer-to-peer file-sharing network with client applications running on the end-system that are connected to a distributed network of dedicated servers. Contrary to the original Gnutella protocol it is not completely decentral as it uses servers; contrary to the original Napster protocol it does not use a single server (farm) which is a single point of failure, instead it uses servers that are run by power users and offers mechanisms for inter-server communication. Unlike super-peer protocols like KaZaa, or the modern Gnutella protocol the edonkey network has a dedicated client/server based structure. The servers are slightly similar to the KaZaa super-nodes, but they are a separate application and do not share any files, only manage the information distribution and work as several central dictionaries which hold the information about the shared files and their respective client locations. In the edonkey network the clients are the only nodes sharing data. Their files are indexed by the servers. If a client wants to download a file or a part of a file, it first has to connect via TCP to a server or send a short search request via UDP to one or more servers to get the necessary information about other clients offering that file. The edonkey network is using 16 byte MD4 hashes to (with very high probability) uniquely identify a file independent of its filename. The implication for searching is that two steps are necessary before a file can be downloaded in the edonkey network. First, a full text search is made at a server for the filename, it is answered with those file hashes that have a filename associated which matches the full text search. In a second step, the client requests the sources from the server for a certain file-hash. Finally, the client connects to some of these sources to download the file. A more detailed protocol analysis based on measurements with TCPDump can be found in our technical report [HB02]. 3 Experiment Description We ran two types of experiments to analyse the edonkey protocol and to collect traffic samples: In the first experiment we measured the traffic at a client connected to 768/128 kbps ADSL connection rsp. a 10 MBit at the TU Darmstadt. The most popular client of the network emule [emule] under Windows XP was used for this experiment. From the measurements we derive traffic characteristics like the protocol overhead, downloading behaviour and message size distributions. For the second experiment we modified an open-source edonkey server [Lus03] that was connected to the university network collecting application level information about the us- 225
3 age of the network, requested files, offered files and the overall size of the network 1. 4 Results TCP/UDP summary. In the experiments with the client the share of the TCP traffic of the overall network traffic was 94% (number of packets) rsp. 99.8% (payload size). Those values do not differ significantly between ADSL and broadband connections. Note that all TCP ACK packets with zero payload were counted, too. On the ADSL line the packet loss was with 5.5% about 2.25 times higher than on the broadband line (2%). The server-side measurements differ: TCP traffic only forms about 2,4% of the packets and 6% of the payload. The server is mainly busy with handling UDP requests from clients not directly connected: If a search of a client does not deliver enough results from the server it is connected to all known servers can be searched. This behaviour has implications on dial-up connections. If the dial-up IP address was assigned to someone running an edonkey server before, many clients all over the world still reference to that IP address as a server. Server entries are typically kept 1 day or longer in most client implementations. These clients will still send UDP based search queries to that IP address consuming bandwidth. This even lead to a permanent entry in the FAQ section of the computer magazine c t [ct04]. The TCP packet sizes use the whole size spectrum from header only to MTU size. Some characteristic peaks can be identified, e.g., for TCP messages of payload size 24, they are typically used for the frequent QUERY SOURCES messages. In most cases a TCP packet carries only a single protocol message. Protocol messages can be identified quite reliably as the payload starts with E3, for details see [HB02]. The UDP packets are much less variable in size, the size clearly indicating which kind of message is transported. Protocol Messages. Looking at the client s UDP traffic the most observed protocol message by far is QUERY SOURCES with about 65%. Looking at TCP messages they are distributed far more evenly, all common messages have a percentual share between one and ten percent, while - surprisingly - the TCP QUERY SOURCES message has only about 0.008%. On the server side the things the most seen messages are QUERY SOURCES ones, with 36% (TCP) and 95% (UDP) occurrence. Throughput. On the emule/adsl and emule/broadband clients we observed an average overall throughput of 30 respectively 45 kb/s while downloading, which decreased to the preset maximum upload bandwidth (10 kb/s in our case) after downloads were finished. UDP traffic is not very important in this scenario. 1 The server proved to be quite popular and due to the sheer amount of flows was ranked on the second place of the traffic statistic of the whole TU Darmstadt network for the duration of the experiment. 226
4 On the server, the UDP in/out ratio was 16/2 kb/s after roughly a day (so we have 18 kb/s overall throughput), while TCP is about 0.75/0.25 kb/s after the same time. In the beginning though TCP throughput is 1.5/1 kb/s and decreases significantly after the server gets more known and UDP throughput increases massively thus suppressing the TCP communication. Connection Statistics. We observed about 100 (emule broadband), 85 (emule ADSL) and 150 (server) connection requests per minute. The share of connections actually used for data exchange is 77%, 74% and 72%. The number of simultaneous connections is 30 to 50 for emule/broadband, 30 to 45 for emule/adsl and quite exactly 700 for the server (gathered by TCP trace file analysis). For getting the average bandwidth use per connection we looked at all connections carrying more than 0.5 MB incoming payload. Of those the absolute majority (several hundred) utilises roughly two to four kb/s, with some more (about 40) ranging from 5 to 10 kb/s. About ten more connections used bandwidths up to 55 KB/sec. Those values are connection independent. Our measurements show that an average of roughly four megabytes of data is transferred per (TCP) connection. The maximum size transferred we encountered was 150 MBytes. The average TCP connection time is 30 minutes, the average idle time 875 seconds (ADSL) and 2500 seconds (broadband). User Statistics. We concentrated on getting information about how much the users share in size and file numbers, and what they search most (indicated by search terms and identified files). Our research showed that the average edonkey user shares 57.8 (max. 470) files with an average size of 217 MB (max 1.2 TByte). Most searched-for keywords were media-related words like MP3, AVI and DVD and a very high share of clearly recognisable words from current blockbuster movie titles. Because all files are identified by their unique hash values we were able to identify the most wanted files by analysing QUERY SOURCES messages. The corresponding filenames were extracted from the PUBLISH FILES messages. This showed that the vast majority of the identified files were movies just played in the cinemas at the time of the experiments. Looking at these results we can state that edonkey is mainly a movie network. Geographical Analysis and Network Size. From all clients connected to the broadband test client the IP addresses were reverse resolved to lookup their top-level domains for a rough geographical overview..de dominates easily with 66.21%, followed by the dot-net -Domains (10%), then.fr (6%) and.at (1%), while clients from Taiwan and Guatemala were both seen more times than clients with.uk. While it is probable that clients from a certain region tend towards higher interconnectivity among themselves, e.g. because they exchange movies in their language this is also an indication that the edonkey network is more popular in Germany than in other countries. The latter is supported by 227
5 To estimate the network size we monitored the number of servers in a server-list provided by ocbmaurice [Ocb04]. This showed that the average size shrinked down from roughly 220 servers in beginning of 2002, over 100 servers in 2003 down to 47 servers in This indicates that the edonkey network as a whole is shrinking. One reason is probably that since the end of 2002 some people operating an edonkey server had trouble with the police 2. 5 Summary and Conclusion In this paper we presented results from two measurement experiments in the edonkey network. They show that the edonkey network is primarily used for downloading current movie blockbusters. Most of the traffic is caused by long-lived TCP connections. A P2P traffic model will therefore be fundamentally different to a web traffic traffic model. References [San03] [edonkey] [emule] [mldonkey] Sandvine Incorporated. Regional Characteristics of P2P - File Sharing as a Multi- Application, Multinational Phenomenon. White Paper, edonkey2000 Original Client Homepage. emule Project Homepage. mldonkey Homepage. [KaZaa] Sharman Networks. The KaZaa application for the FastTrack network. Official Homepage. [Kli02] [Lug04] Alexey Klimkin. pdonkey, an edonkey Protocol Library. Lugdunum. Building an Efficient edonkey Server on Linux/FreeBSD/Win [Lus03] Thomas Lussnig. cdonkey, an Open-Source edonkey Server with Overnet and emule Extensions [Mul02] Tim-Philip Muller. edonkey2000 tools. [Ocb04] Ocbmaurice. edonkey2000 Server-lists and Statistics [HB02] [ct04] Oliver Heckmann, Axel Bock. The edonkey2000 protocol. KOM technical report. c t - Magazin für computer technik. FAQ Section Entry - Nervige Port Scans ( Annoying Port Scans ). Heise Verlag
The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar [email protected] [email protected] Gothenburg, May
Information Searching Methods In P2P file-sharing systems
Information Searching Methods In P2P file-sharing systems Nuno Alberto Ferreira Lopes PhD student (nuno.lopes () di.uminho.pt) Grupo de Sistemas Distribuídos Departamento de Informática Universidade do
Peer-to-Peer File Sharing
The Effects of File Sharing on a Service Provider's Network An Industry White Paper Copyright July 2002, Sandvine Incorporated www.sandvine.com 408 Albert Street Waterloo, Ontario Canada N2L 3V3 Executive
DDoS Vulnerability Analysis of Bittorrent Protocol
DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia [email protected] Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number
Using UDP Packets to Detect P2P File Sharing
188 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 27 Using UDP Packets to Detect P2P File Sharing Tsang-Long Pao and Jian-Bo Chen Tatung University, Taipei,
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered
Introduction Page 2. Understanding Bandwidth Units Page 3. Internet Bandwidth V/s Download Speed Page 4. Optimum Utilization of Bandwidth Page 8
INDEX Introduction Page 2 Understanding Bandwidth Units Page 3 Internet Bandwidth V/s Download Speed Page 4 Factors Affecting Download Speed Page 5-7 Optimum Utilization of Bandwidth Page 8 Conclusion
Multicast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
Clustering in Peer-to-Peer File Sharing Workloads
Clustering in Peer-to-Peer File Sharing Workloads F. Le Fessant, S. Handurukande, A.-M. Kermarrec & L. Massoulié INRIA-Futurs and LIX, Palaiseau, France Distributed Programming Laboratory, EPFL, Switzerland
An Introduction to Peer-to-Peer Networks
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P
LCMON Network Traffic Analysis
LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia [email protected] Abstract The Swinburne
The Challenges of Stopping Illegal Peer-to-Peer File Sharing
The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:
Peer-to-Peer Systems: "A Shared Social Network"
Peer-to-Peer Systems: "A Shared Social Network" Nguyen Hoang Anh Helsinki University of Technology [email protected] Abstract In the last few years, the success of the Napster online music sharing program
Measure wireless network performance using testing tool iperf
Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,
A Measurement Study of Peer-to-Peer File Sharing Systems
CSF641 P2P Computing 點 對 點 計 算 A Measurement Study of Peer-to-Peer File Sharing Systems Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble Department of Computer Science and Engineering University
First Midterm for ECE374 03/24/11 Solution!!
1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your
Three short case studies
Three short case studies peer to peer networking wireless systems search engines each includes issues of hardware processors, storage, peripherals, networks,... representation of information, analog vs.
Bandwidth Management for Peer-to-Peer Applications
Overview Bandwidth Management for Peer-to-Peer Applications With the increasing proliferation of broadband, more and more users are using Peer-to-Peer (P2P) protocols to share very large files, including
Computer Networks CCNA Module 1
Chapter 1: Quiz 1 Q1: Which statement describes a network that supports QoS? The fewest possible devices are affected by a failure. The network should be able to expand to keep up with user demand. The
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
Internet Content Distribution
Internet Content Distribution Chapter 2: Server-Side Techniques (TUD Student Use Only) Chapter Outline Server-side techniques for content distribution Goals Mirrors Server farms Surrogates DNS load balancing
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider
Table of Contents. Cisco Blocking Peer to Peer File Sharing Programs with the PIX Firewall
Table of Contents Blocking Peer to Peer File Sharing Programs with the PIX Firewall...1 Document ID: 42700...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...2 PIX
NETWORKS AND THE INTERNET
NETWORKS AND THE INTERNET Outline to accompany the slide presentation 1. Networks and the Internet A Primer for Prosecutors and Investigators 2. Getting There From networks to the Internet Locating a place
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
PEER TO PEER FILE SHARING USING NETWORK CODING
PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering
State of the Art in Peer-to-Peer Performance Testing. European Advanced Networking Test Center
State of the Art in Peer-to-Peer Performance Testing European Advanced Networking Test Center About EANTC The European Advanced Networking Test Center (EANTC) offers vendor independent network quality
MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1
Table of Contents 1. REQUIREMENTS SUMMARY... 1 2. REQUIREMENTS DETAIL... 2 2.1 DHCP SERVER... 2 2.2 DNS SERVER... 2 2.3 FIREWALLS... 3 2.4 NETWORK ADDRESS TRANSLATION... 4 2.5 APPLICATION LAYER GATEWAY...
HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009
HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer
19531 - Telematics. 14th Tutorial - Proxies, Firewalls, P2P
19531 - Telematics 14th Tutorial - Proxies, Firewalls, P2P Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 10. February, 2011 Institute of Computer Science Telematics
The Effect of Caches for Mobile Broadband Internet Access
The Effect of s for Mobile Jochen Eisl, Nokia Siemens Networks, Munich, Germany Haßlinger, Deutsche Telekom Technik,, Darmstadt, Germany IP-based content delivery: CDN & cache architecture Impact of access
Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.
Overlay Networks An overlay is a logical network on top of the physical network Routing Overlays The simplest kind of overlay Virtual Private Networks (VPN), supported by the routers If no router support
P2P: centralized directory (Napster s Approach)
P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application
Bandwidth Aggregation, Teaming and Bonding
Bandwidth Aggregation, Teaming and Bonding The increased use of Internet sharing combined with graphically rich web sites and multimedia applications have created a virtually insatiable demand for Internet
From Centralization to Distribution: A Comparison of File Sharing Protocols
From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015
Unit 3 - Advanced Internet Architectures
Unit 3 - Advanced Internet Architectures Carlos Borrego Iglesias, Sergi Robles [email protected],[email protected] Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma
LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY. Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University
1 LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University 2 Overview Quick overview What does MBA measure? Can
Application Layer. CMPT371 12-1 Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2
CMPT371 12-1 Application Layer 1 Application Layer Required Reading: Chapter 2 of the text book. Outline of Chapter 2 Network applications HTTP, protocol for web application FTP, file transfer protocol
Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic
MonNet a project for network and traffic monitoring Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic Wolfgang John, Sven Tafvelin and Tomas Olovsson Department
D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)
v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best
BroadCloud PBX Customer Minimum Requirements
BroadCloud PBX Customer Minimum Requirements Service Guide Version 2.0 1009 Pruitt Road The Woodlands, TX 77380 Tel +1 281.465.3320 WWW.BROADSOFT.COM BroadCloud PBX Customer Minimum Requirements Service
Improving Gnutella Protocol: Protocol Analysis And Research Proposals
Improving Gnutella Protocol: Protocol Analysis And Research Proposals Igor Ivkovic Software Architecture Group (SWAG) Department of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1 Canada
Peer-to-Peer Networks Organization and Introduction 1st Week
Peer-to-Peer Networks Organization and Introduction 1st Week Department of Computer Science 1 Peer-to-Peer Networks Organization 2 2 Web & Dates Web page http://cone.informatik.uni-freiburg.de/lehre/vorlesung/
P2P Characteristics and Applications
P2P Characteristics and Applications Lecture for the Project Group A Distributed Framework for Social Networks Dr.-Ing. Kalman Graffi Email: [email protected] Fachgruppe Theorie verteilter Systeme Fakultät
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
CSCI 491-01 Topics: Internet Programming Fall 2008
CSCI 491-01 Topics: Internet Programming Fall 2008 Introduction Derek Leonard Hendrix College September 3, 2008 Original slides copyright 1996-2007 J.F Kurose and K.W. Ross 1 Chapter 1: Introduction Our
Exploiting P2P Systems for DDoS Attacks
Exploiting P2P Systems for DDoS Attacks Naoum Naoumov and Keith Ross Department of Computer and Information Science Polytechnic University, Brooklyn, NY 1121 Abstract When a P2P system has millions of
Peer to peer networking: Main aspects and conclusions from the view of Internet service providers
Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Gerhard Haßlinger, Department of Computer Science, Darmstadt University of Technology, Germany Abstract:
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,
Managing Virtual Servers
CHAPTER 4 Content Switching Module Device Manager (CVDM-CSM) displays details of existing virtual servers and enables users to perform detailed tasks that include creating or deleting virtual servers,
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
WebEx. Network Bandwidth White Paper. WebEx Communications Inc. - 1 -
WebEx Network Bandwidth White Paper WebEx Communications Inc. - 1 - Copyright WebEx Communications, Inc. reserves the right to make changes in the information contained in this publication without prior
Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor
-0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University
New possibilities for the provision of value-added services in SIP-based peer-to-peer networks
New possibilities for the provision of value-added services in -based peer-to-peer networks A.Lehmann 1,2, W.Fuhrmann 3, U.Trick 1, B.Ghita 2 1 Research Group for Telecommunication Networks, University
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Non-intrusive, complete network protocol decoding with plain mnemonics in English
The Triple Play Analysis Suite - DATA The Triple Play Analysis Suite - Data are meant for emulating the client s application such as FTP downloading or Web Browser testing at the termination point of DSL
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
LAN Planning Guide LAST UPDATED: 1 May 2013. LAN Planning Guide
LAN Planning Guide XO Hosted PBX Document version: 1.05 Issue date: 1 May 2013 Table of Contents Table of Contents... i About this Document... 1 Introduction: Components of XO Hosted PBX... 1 LAN Fundamentals...
Inside the Storm: Protocols and Encryption of the Storm Botnet
Inside the Storm: Protocols and Encryption of the Storm Botnet Joe Stewart, GCIH Director of Malware Research, SecureWorks To be covered in this talk: Quick-and-dirty unpacking of Storm Structure of the
Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg
Peer-to-Peer Networks 02: Napster & Gnutella Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Napster Shawn (Napster) Fanning - published 1999 his beta
Chapter 3. Internet Applications and Network Programming
Chapter 3 Internet Applications and Network Programming 1 Introduction The Internet offers users a rich diversity of services none of the services is part of the underlying communication infrastructure
SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1
SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1 Application Note: SAN/iQ Remote Copy Networking Requirements SAN/iQ Remote Copy provides the capability to take a point in time snapshot of
Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide
Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...
PEER-TO-PEER NETWORK
PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Advanced Peer to Peer Discovery and Interaction Framework
Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 [email protected] Mohamed E. Fayad Computer Engineering
HollyShare: Peer-to-Peer File Sharing Application
HollyShare: Peer-to-Peer File Sharing Application ICS 243A Class Project Songmei Han Bijit Hore Ilya Issenin Sean McCarthy Shannon Tauro HollyShare Project: Final Report 1 INTRODUCTION...3 SURVEY...5 Architecture
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands [email protected]
A Survey of Peer-to-Peer Network Security Issues
1 of 8 1/9/2008 12:32 PM A Survey of Peer-to-Peer Network Security Issues James Li Abstract In recent years, peer-to-peer (P2P) networks have soared in popularity in the form of file sharing applications.
Netgear TA612VMNF & TA612VLD Netgear WGR613VAL. Quality of Service (QOS) function
Netgear TA612VMNF & TA612VLD Netgear WGR613VAL Quality of Service (QOS) function 1 Revision History Date Revision Description July 2007 1.1 Final Draft submission Table of Contents Using QoS on NETGEAR
Peer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf
Peer-to-Peer Systems Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf Peer-to-Peer Systems Organizational Information Organisational matters Lecturer Jun.-Prof.
Chakchai So-In, Ph.D.
Application Layer Functionality and Protocols Chakchai So-In, Ph.D. Khon Kaen University Department of Computer Science Faculty of Science, Khon Kaen University 123 Mitaparb Rd., Naimaung, Maung, Khon
Best Practices - Monitoring and Controlling Peer-to-Peer (P2P) Applications
Best Practices - Monitoring and Controlling Peer-to-Peer (P2P) Applications APPLICATION Peer-to-Peer (P2P) EXAMPLES AudioGalaxy, edonkey, BitTorrent, KaZaA, etc. USAGE Locate and exchange (swap) files.
INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315
INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315 The Digital Millennium Copyright Act (DMCA) and Peer-to-Peer File Sharing Policy Copying, distributing, and downloading copyrighted materials, including
Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project
Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used
Networks and the Internet A Primer for Prosecutors and Investigators
Computer Crime & Intellectual Property Section Networks and the Internet A Primer for Prosecutors and Investigators Michael J. Stawasz Senior Counsel Computer Crime and Intellectual Property Section ()
Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and
1.1 Background Voice over Internet Protocol (VoIP) is a technology that allows users to make telephone calls using a broadband Internet connection instead of an analog phone line. VoIP holds great promise
MULTI WAN TECHNICAL OVERVIEW
MULTI WAN TECHNICAL OVERVIEW The Multi WAN feature will allow the service provider to load balanced all client TCP and UDP traffic only. It also provides redundancy for HA. Traffic that is load balanced:
The Algorithm of Sharing Incomplete Data in Decentralized P2P
IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 2007 149 The Algorithm of Sharing Incomplete Data in Decentralized P2P Jin-Wook Seo, Dong-Kyun Kim, Hyun-Chul Kim,
Characterizing the Query Behavior in Peer-to-Peer File Sharing Systems*
Characterizing the Query Behavior in Peer-to-Peer File Sharing Systems* Alexander Klemm a Christoph Lindemann a Mary K. Vernon b Oliver P. Waldhorst a ABSTRACT This paper characterizes the query behavior
Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2
Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation
Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications
Single Pass Load Balancing with Session Persistence in IPv6 Network C. J. (Charlie) Liu Network Operations Charter Communications Load Balancer Today o Load balancing is still in use today. It is now considered
Internet2 NetFlow Weekly Reports
Internet2 NetFlow Weekly Reports Stanislav Shalunov Internet2 Fall Member Meeting, Indianapolis, 2003-10-13 What is NetFlow? Originally a Cisco proprietary technology Now supported by other vendors and
