PUBLIC DOMAIN P2P FILE SHARING NETWORKS CONTENT AND THEIR EVOLUTION

Size: px
Start display at page:

Download "PUBLIC DOMAIN P2P FILE SHARING NETWORKS CONTENT AND THEIR EVOLUTION"

Transcription

1 PUBLIC DOMAIN P2P FILE SHARING NETWORKS CONTENT AND THEIR EVOLUTION Jaime Lloret 1, Juan R. Diaz 2, Jose M. Jiménez 3, Manuel Esteve 4 Department of Communications, Polytechnic University of Valencia Camino Vera s/n Valencia Spain 1 jlloret@dcom.upv.es, 2 juadasan@dcom.upv.es, 3 jojiher@masters.upv.es, 4 mesteve@dcom.upv.es ABSTRACT Since the appearance of Peer-To-Peer file sharing networks a few years ago, many Internet users have chosen this technology to search programs, films, songs, documents, etc. In this article, six public P2P networks (Gnutella, FastTrack, Opennap, Edonkey, MP2P and Soulseek) have been analyzed. We have tracked their evolution in terms of connected users, number of shared files and total amount of data shared inside of them for two years. The results are compared and discussed with previous measurements taken by other authors in order to show their evolution. We have measured their type of content and we have checked that those analyzed P2P networks seems to be specialized in different type of files. KEY WORDS Peer-to-Peer networks, File sharing networks, Evolution. 1. Introduction Currently there are many P2P file-sharing networks in existence, and many of them have millions of on-line users and millions of GBytes shared. Although, there are users that try to download files from the network, without intention of providing any, there are a lot of users who are able to share what they have with the whole community without caring about who is downloading their files. One of the first steps is to differentiate between P2P network and P2P clients. P2P networks are a set of rules and interactions that allow P2P clients to communicate. A P2P client is a computer application that allows a user interacts with other users in the same network. The number of P2P emergent networks is continuously increasing and their clients are having more and more capabilities every time. P2P networks can be classified according the parameters taken into account (structure, grade of centralization, discovery and search algorithm, file downloading system, etc.). In all these types of P2P networks, data transfer is made directly between edge clients, without any central server mediating this transfer. The 6 main public domain P2P file-sharing networks are Gnutella [1], FastTrack [2], Opennap [3], Edonkey [4], MP2P [5] and Soulseek [6], although there are other networks not so popular [7]. Because the social impact of public domain P2P filesharing networks, both industry and academia are spending time and money analyzing several aspects of these networks: The legality of the files that are being shared [8]. The potential risks for home users [9] The potential risks in enterprises with workers using their workstations as P2P clients [10]. Most P2P networks have not been designed to address security issues (authentication, file permissions and file integrity); some P2P clients even include addware or spyware. Moreover, as files are often downloaded from unknown users, they may include some viruses or trojans inside the files. Even so, keeping in mind those aspects, the number of Internet users using P2P file-sharing networks is still growing. Sandvine Incorporated has measured in [11] that some ISPs networks became rapidly congested and P2P traffic reached nearly 60% of the total traffic in their networks. Although not so striking, Internet2 administrators also computed impressive results on 16 February 2004 where 10.46% of the total traffic was originated by P2P filesharing [12]. On the other hand, CAIDA (Cooperative Association for Internet Data Analysis) also shows that Internet traffic is mainly dominated by HTTP and P2P file-sharing protocols [13]. There are several public domain P2P file-sharing networks measurements published, some of them have been taken in a deceptive manner (e.g., the number of connected users is calculated solely based on the amount of users that download a certain P2P client program [9, 10]), others give the maximum number of users only (e.g., Napster reached the number of 20 million connected users with 1.5 billion of shared files in July 2000 [14]), and others, just give the average of users for a certain period

2 of time (e.g., S. Saroiu et al., in their article [15], show the average number of connected users in a P2P network). Some studies have analyzed which type of P2P filesharing network is used, by Internet users, from different regions of the world [16]. Some papers even study the economic cost of downloading a file analyzing the required time [17]. None of those papers and measurements aforementioned has studied the users and their content from inside the network, using as a source the protocol. P2P file-sharing networks analyzed in this paper have protocols that permit to measure the number of users, number of files, the amount of shared information and the type of shared files inside each one of these networks. On the other hand, the number of users and the number of shared files in those public domain P2P file-sharing networks varies over the time, so an evolution of these types of networks is needed in order to have updated measures. This paper is structured as follows. Section 2 shows selected P2P file-sharing networks evolution; the measurements have been taken from 2003 to Section 3 shows the evolution of their content compared with measurements taken from other authors. Current percentage of video, audio, documents, programs and compressed files shared in those networks are shown in section 4. Finally, in section 5, we have explained our conclusions. 2. P2P file sharing Networks evolution Figures 1 and 2 show the evolution in terms of users and number of shared files, respectively, in Gnutella, FastTrack, Opennap, Edonkey networks. Those measurements have been taken from March 2003 to March MP2P and Soulseek networks measurements have been taken from March 2004 to March To take accurate measurements of the corresponding P2P file-sharing networks, the most adequate clients have been selected; bearing in mind those that would provide the most information on the architecture or the highest update frequency to measure the parameters. The Gnutella network has been analyzed with the Limewire client. In the FastTrack network, the measurements have been taken with the KaZaA Lite client. In order to analyze OpenNap network, the Xnap client has been used. The edonkey2000 client has been utilized to analyze the edonkey network. The MP2P architecture has been analyzed by means of the Piolet client. Finally, the Nicotine client has been used in order to analyze the SoulSeek network. File replication in P2P file-sharing networks is ordered by power-law, more concretely by the Zipf-law, as papers [18][19][20] demonstrate it. This law explains that few users have most of the files in the network. We have observed, with the measurements taken, that all analyzed P2P networks have their number of shared files by a user greater than years before. This makes sense, the amount of shared files in a P2P file-sharing network trend to grow because the most popular files trend to replicate in the network. However, we have to take into account that users hard disks capacity are limited, so many users use to record in optical disks many downloaded files, then, those files are deleted from users hard disks. Even so, our measurements indicate that users of Gnutella network, have grown their files per user from an average of files in 2003 to an average of files in FastTrack users had an average of files in their hard disks in 2003, next 6 months this number was decreasing because many users left that P2P network and, later, it has grown till files per user in OpenNap users began with an average of files per user, this number decreased in November 2003 and till that date it has been growing up to files per user. Users in edonkey network are the one with fewer files per user. They began with an average of files per user in 2003 and now they have files per user. Finally, MP2P users have had an average of files per user in both years. Soulseek network doesn t allow measuring how many files all users share, so we couldn t know their average. Reference [21] shows measurements taken (number of users, number of shared files and total amount of shared information) by us, in each one of these networks, during a week. Last measurements, in 2005, show that edonkey network can have variations of ± 1 million of users in one hour. FastTrack can have variations of ± 700,000 users in one hour, OpenNap and Gnutella can have variations of ± 50,000 users in one hour and MP2P can have variations of ± 10,000 users in one hour. Soulseek is still growing. 3. P2P file-sharing networks content evolution This section compares our measurements with some measurements taken by other authors. J. Chu, K. Labonte and B. Levine, in their paper [22], took measurements for Gnutella network using Limeware client, from February 24, 2002 to March 25, In this paper, they searched some files (avi, mp3, mpg, etc.). Those files were the most popular files in the network. Now, we have searched the same files to see their current availability. They created three lists with top 50 all files, top 50 audio files and top 50 video files in that moment. We have searched the same files in the Gnutella network, using the same desktop P2P file-sharing client application (Limeware), and we have observed the following: All files in top 50 all files have decreased their number of replicas in the network. None of them has increased or maintained their availability. The average of that decreasing is over 75.6%.

3 Numberof users Gnutella OpenNap MP2P FastTrack edonkey Soulseek mar-03 may-03 jul-03 sep-03 nov-03 ene-04 mar-04 may-04 jul-04 sep-04 nov-04 ene-05 mar-05 Figure 1. Number of users in analyzed networks Figure 2. Number of files in analyzed networks All files in top 50 audio files have decreased with an average of 74.1%. Results in top 50 videos files list are very different. The number of users, in more than a half of those videos, has grown. Most of those videos, that have grown their availability, are pornographic videos. According to the measures taken in previous section, the number of files inside the analyzed P2P file-sharing networks continues growing. However, older files, that before were the most replicated, are diminishing their availability as time goes on. That happens because new files are appearing in the network, and those new files become the most replicated, despite older files trend to disappear. The files most downloaded aren t always the same. This analysis is not applied to pornographic videos, this type of files grow their availability as time goes on. On the other hand, Subhabrata Sen and Jia Wang, in their paper [23], took some measurements in Gnutella and FastTrack networks, from September 2001 to December Between this dates, both networks were growing as they say in their paper. There were an average of users in Gnutella network and an average of users in FastTrack network. If we compare those measures with our measurements, we can observe that between those dates and the first time we took measurements, the number of users began to decrease. Currently, the number of Gnutella users is growing again, but the number of FastTrak users is still decreasing. Beverly Yang and Hector Garcia-Molina, in their paper [24], used experimental results taken from OpenNap network, at the end of Users in this network had an average of 168 files per user. As we can observe in our measurements, this file average has varied along the years. In March 2003, every user had an average of 586 files per user. In October 2003, this average decreased to 444 files per user. In March 2004, the average grew up to 619 files per user. In March 2005, the average we have measured is 665 files per user. Currently, this average trends to grow. As the measurements have varied over the time, researchers have to model their networks taking into account these types of parameters. Time Number of users Gnutella FastTrack OpenNap edonkey MP2P mar-03 may-03 jul-03 sep-03 nov-03 ene-04 mar-04 may-04 jul-04 sep-04 nov-04 ene-05 mar-05 Table 1 summarizes all results obtained. What percentage of files per users has varied along 2 years is also shown. 3. P2P file-sharing networks content In order to know which percentage has some type of files inside the P2P file-sharing networks analyzed, we have classified 5 types of files: Video: avi, mpg, asf, mpeg, rm y wmv. : mp3, ogg, wma, wav, aac y ac3. : pdf, doc, txt, rtf, wps, sxw y pps. : exe, com, msi y sh. files: ace, rar, arj, zip y gz. Time This classification allows us to know what types of files are most popular and replicated between P2P file-sharing network users. Figures 3, 4, 5, 6, 7 and 8, shows that all P2P networks, discarding edonkey network, have audio files as the most type of files. It happens because P2P filesharing network origins were developed to share audio files only. However, the second type of shared files in all these networks vary considerably. Table 2 shows the classification for each analyzed network. Measures obtained allow us to know that many of those shared files are multimedia, and there are not so many programs or compressed files shared. The network which multimedia files percentage is greater (discarding MP2P network, whose files are audio only) is Soulseek with a 98%. The second one is Gnutella with 77%. OpenNap has 73%, FastTrack has 66% and the last one is edonkey with 63%. On the other hand, we want to highlight that the P2P filesharing network with most total amount of shared data is edonkey network. It happens because video files and compressed files, in that network, have big sizes. Some of these files have more than 4 GB. If we take into account that users with more bandwidth have more online times downloading files from the network (as it is measured by S. Sen and J. Wang in [23]), that users will have the most replicated files.

4 7% 4% 7% 1% 11% 14% 20% 12% 36% 26% 4% 9% 55% 41% 53% Figure 4. Gnutella Content Figure 5. FastTrack Content Figure 6. OpenNap Content 4% 0% 2% 6% 7% 12% 3% 21% 32% 31% 100% 82% Figure 7. edonkey Content Figure 8. MP2P Content Figure 9. Soulseek Content Centralization Download System Users. Files Type of Files per Protocol Ports files user Gnutella decentralized Multi-souce Grows Grows All % TCP 6346, 6347 FastTrack Partially decentralized Multi-souce Decreases Grows Alls % TCP 1214 OpenNap Partially decentralized Multi-souce Decreases Decreases All % TCP 6699, 7777, 8888 edonkey Partially decentralized Segmented Multi-souce Grows Grows All % TCP, UDP MP2P Partially decentralized Single-source Grows Grows -0.02% UDP SoulSeek Centralized Single-source Grows n/t All n/t TCP 2234, 5534 Video Gnutella 2 nd 1 st 3 rd 4 th 5 th FastTrack 3 rd 1 st 2 nd 4 th 5 th OpenNap 2 nd 1 st 4 th 5 th 3 rd edonkey 1 st 2 nd 3 rd 4 th 5 th MP2P - 1 st Soulseek 2 nd 1 st 4 th 5 th 3 rd Table 2. P2P file sharing networks file classification 4. Conclusion There is not any relationship between the number of online users in a P2P file-sharing network and the number of shared files in the network. OpenNap and MP2P networks had the same number of users in March 2004; however, OpenNap network had three times more shared files than MP2P network. On the other hand, edonkey network has had always more users than OpenNap network, however, OpenNap network has had more shared files than edonkey network between March 2003 and January The network with most average of shared files per user is OpenNap. Table 1. Analyzed networks summary (n/t: measurements not taken) P2P networks, whose number of users is stable or is decreasing, grows its number of files per user in the network because the users replicate the shared files in the network. The number of users of some older P2P file-sharing networks is decreasing because new P2P file-sharing networks, with more features, are appearing. For instance, the edonkey network is better than others for lager files, so it is attracting users that look for video files, from the other ones. However, the total number of users using P2P file-sharing networks is growing. There are more files and users in P2P file-sharing networks, but older files trend to disappear. New files grow their replication rapidly, but as the time goes on, the availability decreases because users delete those files. However, pornographic files, discarding their age, grow their availability inside the network as it has been shown in section 3. The total amount of shared data in P2P networks are not dependent with the number of shared files inside the network. FastTrack network is the one with most shared files, however, the network with more total amount of shared data is edonkey network because many of the files shared are big size files. We have seen that some P2P networks are able to support variations till 1 million of more, or less, users in one hour. Our results have been compared and discussed with previous measurements taken by other authors in order to show P2P networks evolution. This paper demonstrates

5 that other author s measurements for P2P networks (such as average of files per user, most popular files and the type of files shared by Internet users) have varied along the years. As it has been demonstrated in [25], the file popularity in P2P file-sharing networks has a relationship with their popularity in web searchers. This article also demonstrates that P2P file-sharing networks seem to be specialized in different type of files, although many of them allow sharing all type of files. When a user wants to search any type of file, he/she has to take into account the users in any one of the analyzed networks (measured in section 3) and the percentage of this type of file inside the networks (measured in section 4) to obtain where is more probably to find the desired file. References: [1] Eytan Adar and Bernardo Huberman. Free riding on gnutella. First Monday, 5(10), October [2] Nathaniel Leibowitz, Matei Ripeanu, and Adam Wierzbicki, Deconstructing the Kazaa Network, 3 rd IEEE Workshop on Internet Applications. June [3] OpenNap Website, [4] Oliver Heckmann and Axel Bock. The edonkey 2000 Protocol. Technical Report KOM-TR , Multimedia Communications Lab, Darmstadt University of Technology. December [5] MP2P Website: [6] Soulseek Website, [7] Wikipedia Website: [8] Palisade. Available at: p2pstudyrelease.shtml [9] United States House of Representatives Committee on Government Reform, Staff Repport. File-sharing programs and peer-to-peer networks privacy and security risks. United States House of Representatives Committee on Government. May [10] AssetMetrix Research Labs, Corporate. P2P (Peer- To-Peer) Usage and Risk Analysis. Technical Report [11] Sandvine Incorporated. Peer-to-Peer File Sharing: The impact of filesharing on service provider networks, White Paper, Sepember [12] Internet2 Website [13] CAIDA Website: [14] The Pew Internet & American Life Project s Online Music, September 28, Available at ort2.pdf [15] Stefan Saroiu, P. Krishna Gummadi and Steven D. Gribble. A Measurement Study of Peer-to-Peer File Sharing Systems, Department of Computer Science & Engineering, University of Washington, Technical Report. UW-CSE [16] Sanvine Incorporated. Regional Characteristics of P2P: File sharing as a multi-application, multi-national phenomenon. White Paper. October [17] Artur Marques. Freeloading. Available at ot_com_freeloading.pdf [18] Z. Ge, D. R. Figueiredo, S. Jaiswal, J. Kurose, D. Towsley. Modeling Peer-Peer File Sharing Systems, Proceedings of IEEE Infocom 2003, April [19] Krishna P. Gummadi, Richard J. Dunn, Stefan Saroiu, Steven D. Gribble, Henry M. Levy, John Zahorjan, Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload. Proceedings of the nineteenth ACM symposium on Operating systems principles. Pag [20] Qin Lv, Pei Cao, Edith Cohen, Kai Li, and Scott Shenker. Search and replication in unstructured peer-topeer networks. Proceedings. of the sixteenth International Conference on Supercomputing, ACM Press. Pag , [21] J. Lloret, B. Molina, C. Palau, M. Esteve, Public Peer-To-Peer Filesharing Networks Evaluation. The 2 nd IASTED International Conference on Communication and Computer Networks. MIT Cambridge, MA. Nov [22] J. Chu, K. Labonte, and B. Levine. Availability and locality measurements of peer-to-peer file systems. In Proceedings of SPIE ITCom: Scalability and Traffic Control in IP Networks, vol July [23] Subhabrata Sen an Jia Wang. Analyzing peer-to-peer traffic across large networks. IEEE/ACM Transactions on Networking (TON) archive. Volume 12, Issue 2. Pag [24] Yang, B., Garcia-Molina, Hector. Comparing Hybrid Peer-to-Peer Systems. Proceedings of the 27th Intl. Conf. on Very Large Data Bases. Pag October [25] J. Lloret, J. R. Diaz, J. M. Jimenez and M. Esteve. The Popularity Parameter in Unstructured P2P Filesharing Networks. WSEAS Transactions on Computers, Issue 6, Volume 3. December 2004.

Interconnecting Unstructured P2P File Sharing Networks

Interconnecting Unstructured P2P File Sharing Networks Interconnecting Unstructured P2P File Sharing Networks Jaime Lloret Department of Communications, Polytechnic University of Valencia Camino de Vera s/n 46020 Valencia (Spain) Phone: +34 609549043 Fax:

More information

Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic

Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic William Acosta and Surendar Chandra University of Notre Dame, Notre Dame IN, 46556, USA {wacosta,surendar}@cse.nd.edu Abstract.

More information

Clustering in Peer-to-Peer File Sharing Workloads

Clustering in Peer-to-Peer File Sharing Workloads Clustering in Peer-to-Peer File Sharing Workloads F. Le Fessant, S. Handurukande, A.-M. Kermarrec & L. Massoulié INRIA-Futurs and LIX, Palaiseau, France Distributed Programming Laboratory, EPFL, Switzerland

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

Clustering in Peer-to-Peer File Sharing Workloads

Clustering in Peer-to-Peer File Sharing Workloads Clustering in Peer-to-Peer File Sharing Workloads F. Le Fessant, S. Handurukande, A.-M. Kermarrec & L. Massoulié INRIA-Futurs and LIX, Palaiseau, France EPFL, Lausanne, Switzerland Microsoft Research,

More information

Using UDP Packets to Detect P2P File Sharing

Using UDP Packets to Detect P2P File Sharing 188 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 27 Using UDP Packets to Detect P2P File Sharing Tsang-Long Pao and Jian-Bo Chen Tatung University, Taipei,

More information

Monitoring Challenges and Approaches for P2P File-Sharing Systems

Monitoring Challenges and Approaches for P2P File-Sharing Systems Monitoring Challenges and Approaches for P2P File-Sharing Systems Danny Hughes Computing, InfoLab21, Lancaster University, Lancaster, UK. +44 (0)1524 510351 danny@comp.lancs.ac.uk James Walkerdine Computing,

More information

Peer to peer networks: sharing between peers. Trond Aspelund

Peer to peer networks: sharing between peers. Trond Aspelund Peer to peer networks: sharing between peers Trond Aspelund Abstract In this literature survey we look at peer-to-peer networks. We first see how peer-to-peer networks distinguish themselves from the client/server

More information

How To Analyse The Edonkey 2000 File Sharing Network

How To Analyse The Edonkey 2000 File Sharing Network The edonkey File-Sharing Network Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf Steinmetz Multimedia Kommunikation (KOM) Technische Universität Darmstadt Merckstr. 25, 64293 Darmstadt (heckmann, bock,

More information

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390 The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May

More information

Efficient Search in Gnutella-like Small-World Peerto-Peer

Efficient Search in Gnutella-like Small-World Peerto-Peer Efficient Search in Gnutella-like Small-World Peerto-Peer Systems * Dongsheng Li, Xicheng Lu, Yijie Wang, Nong Xiao School of Computer, National University of Defense Technology, 410073 Changsha, China

More information

An Open Tracing System for P2P File Sharing Systems

An Open Tracing System for P2P File Sharing Systems An Open Tracing System for P2P File Sharing Systems Danny Hughes, James Walkerdine Computing Department Lancaster University Lancaster, UK danny@comp.lancs.ac.uk walkerdi@comp.lancs.ac.uk Kevin Lee School

More information

A Measurement Study of Peer-to-Peer File Sharing Systems

A Measurement Study of Peer-to-Peer File Sharing Systems CSF641 P2P Computing 點 對 點 計 算 A Measurement Study of Peer-to-Peer File Sharing Systems Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble Department of Computer Science and Engineering University

More information

On the Penetration of Business Networks by P2P File Sharing

On the Penetration of Business Networks by P2P File Sharing On the Penetration of Business Networks by P2P File Sharing Kevin Lee School of Computer Science, University of Manchester, Manchester, UK. +44 () 161 2756132 klee@cs.man.ac.uk Danny Hughes Computing,

More information

Impact of Peer Incentives on the Dissemination of Polluted Content

Impact of Peer Incentives on the Dissemination of Polluted Content Impact of Peer Incentives on the Dissemination of Polluted Content Fabricio Benevenuto fabricio@dcc.ufmg.br Virgilio Almeida virgilio@dcc.ufmg.br Cristiano Costa krusty@dcc.ufmg.br Jussara Almeida jussara@dcc.ufmg.br

More information

Peer-to-peer Traffic: Impact on ISPs and Evaluation of Traffic Management Tools

Peer-to-peer Traffic: Impact on ISPs and Evaluation of Traffic Management Tools Peer-to-peer Traffic: Impact on ISPs and Evaluation of Traffic Management Tools Anttoni Halme Helsinki University of Technology amhalme@cc.hut.fi Abstract One of the greatest properties of the Internet

More information

On the Penetration of Business Networks by P2P File Sharing

On the Penetration of Business Networks by P2P File Sharing On the Penetration of Business Networks by P2P File Sharing Kevin Lee School of Computer Science, University of Manchester, Manchester, M13 9PL, UK. +44 (0) 161 2756132 klee@cs.man.ac.uk Danny Hughes Computing,

More information

Towards a Peer-to-Peer Extended Content Delivery Network

Towards a Peer-to-Peer Extended Content Delivery Network Towards a Peer-to-Peer Extended Content Delivery Network Daniel Pakkala and Juhani Latvakoski VTT Electronics, Kaitoväylä 1, P.O. Box 1100, FIN-90571 Oulu, Finland E-mail: {Daniel.Pakkala, Juhani.Latvakoski}@vtt.fi

More information

Controlling P2P File-Sharing Networks Traffic

Controlling P2P File-Sharing Networks Traffic Controlling P2P File-Sharing Networks Traffic Miguel Garcia, Mohammed Hammoumi, Alejandro Canovas and Jaime Lloret Integrated Management Coastal Research Institute, Polytechnic University of Valencia C/

More information

Table of Contents. Cisco Blocking Peer to Peer File Sharing Programs with the PIX Firewall

Table of Contents. Cisco Blocking Peer to Peer File Sharing Programs with the PIX Firewall Table of Contents Blocking Peer to Peer File Sharing Programs with the PIX Firewall...1 Document ID: 42700...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...2 PIX

More information

THE BITTORRENT P2P FILE-SHARING SYSTEM: MEASUREMENTS AND ANALYSIS. J.A. Pouwelse, P. Garbacki, D.H.J. Epema, H.J. Sips

THE BITTORRENT P2P FILE-SHARING SYSTEM: MEASUREMENTS AND ANALYSIS. J.A. Pouwelse, P. Garbacki, D.H.J. Epema, H.J. Sips THE BITTORRENT P2P FILE-SHARING SYSTEM: MEASUREMENTS AND ANALYSIS J.A. Pouwelse, P. Garbacki, D.H.J. Epema, H.J. Sips Department of Computer Science, Delft University of Technology, the Netherlands j.a.pouwelse@ewi.tudelft.nl

More information

Peer to peer networking: Main aspects and conclusions from the view of Internet service providers

Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Gerhard Haßlinger, Department of Computer Science, Darmstadt University of Technology, Germany Abstract:

More information

Simulating a File-Sharing P2P Network

Simulating a File-Sharing P2P Network Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance

More information

Characterizing the Query Behavior in Peer-to-Peer File Sharing Systems*

Characterizing the Query Behavior in Peer-to-Peer File Sharing Systems* Characterizing the Query Behavior in Peer-to-Peer File Sharing Systems* Alexander Klemm a Christoph Lindemann a Mary K. Vernon b Oliver P. Waldhorst a ABSTRACT This paper characterizes the query behavior

More information

A Comparison of Peer-to-Peer Search Methods

A Comparison of Peer-to-Peer Search Methods A Comparison of Peer-to-Peer Search Methods Dimitrios Tsoumakos Computer Science Department University of Maryland dtsouma@cs.umd.edu Nick Roussopoulos Computer Science Department University of Maryland

More information

An Introduction to Peer-to-Peer Networks

An Introduction to Peer-to-Peer Networks An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P

More information

Advanced Application-Level Crawling Technique for Popular Filesharing Systems

Advanced Application-Level Crawling Technique for Popular Filesharing Systems Advanced Application-Level Crawling Technique for Popular Filesharing Systems Ivan Dedinski and Hermann de Meer University of Passau, Faculty of Computer Science and Mathematics 94030 Passau, Germany {dedinski,

More information

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University

More information

AN INVESTIGATION INTO DARKNETS AND THE CONTENT AVAILABLE VIA ANONYMOUS PEER-TO-PEER FILE SHARING

AN INVESTIGATION INTO DARKNETS AND THE CONTENT AVAILABLE VIA ANONYMOUS PEER-TO-PEER FILE SHARING AN INVESTIGATION INTO DARKNETS AND THE CONTENT AVAILABLE VIA ANONYMOUS PEER-TO-PEER FILE SHARING Symon Aked School of Computer and Security Science Edith Cowan University, Perth Western Australia secau.2011@tanstaafl.com.au

More information

CDN and Traffic-structure

CDN and Traffic-structure CDN and Traffic-structure Outline Basics CDN Traffic Analysis 2 Outline Basics CDN Building Blocks Services Evolution Traffic Analysis 3 A Centralized Web! Slow content must traverse multiple backbones

More information

Measurement of edonkey Activity with Distributed Honeypots

Measurement of edonkey Activity with Distributed Honeypots Measurement of edonkey Activity with Distributed Honeypots Oussama Allali, Matthieu Latapy and Clémence Magnien LIP6 CNRS and Université Pierre et Marie Curie (UPMC Paris 6) 14, avenue du Président Kennedy

More information

A Measurement-based Traffic Profile of the edonkey Filesharing Service

A Measurement-based Traffic Profile of the edonkey Filesharing Service A Measurement-based Traffic Profile of the edonkey Filesharing Service Kurt Tutschku Institute of Computer Science, University of Würzburg, Am Hubland, D-97074 Würzburg, Germany. tutschku@informatik.uni-wuerzburg.de

More information

An Efficient Load Balancing Technology in CDN

An Efficient Load Balancing Technology in CDN Issue 2, Volume 1, 2007 92 An Efficient Load Balancing Technology in CDN YUN BAI 1, BO JIA 2, JIXIANG ZHANG 3, QIANGGUO PU 1, NIKOS MASTORAKIS 4 1 College of Information and Electronic Engineering, University

More information

Load Balancing through Automated Replication in Unstructured P2P File Sharing Systems

Load Balancing through Automated Replication in Unstructured P2P File Sharing Systems SBRC 2007 - Desempenho em Sistemas P2P 957 Load Balancing through Automated Replication in Unstructured P2P File Sharing Systems Cristina L. Abad 1 1 Facultad de Ingeniería en Electricidad y Computación

More information

Network Applications

Network Applications Computer Networks Network Applications Based on Computer Networking, 3 rd Edition by Kurose and Ross Network applications Sample applications E-mail Web Instant messaging Remote login P2P file sharing

More information

Trust and reputation in file-sharing Peer-to-Peer systems

Trust and reputation in file-sharing Peer-to-Peer systems TDDC03 Projects, Spring 2004 Trust and reputation in file-sharing Peer-to-Peer systems Peng Mu, Xianying Cheng Supervisor: Claudiu Duma Trust and reputation in file-sharing Peer-to-Peer systems Peng Mu,

More information

Balanced Reputation Detective System (BREDS): Proposed Algorithm

Balanced Reputation Detective System (BREDS): Proposed Algorithm Balanced Reputation Detective System (BREDS): Proposed Algorithm Pallavi Bansal 1, Narender Singh 2 1,2Computer science &Engineering department, G.I.T.M, Bilaspur, Yamunanagar, Haryana ---------------------------------------------------------------------***---------------------------------------------------------------------

More information

Modeling Peer-Peer File Sharing Systems

Modeling Peer-Peer File Sharing Systems odeling Peer-Peer File Sharing Systems Zihui Ge, Daniel R. Figueiredo, Sharad Jaiswal, Jim Kurose, Don Towsley Department of Computer Science University of assachusetts, Amherst gezihui, ratton, sharad,

More information

Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices

Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices O.O. Abiona 1, A. I. Oluwaranti 2, T. Anjali 3, C. E. Onime 4, E.O. Popoola 5, G.A. Aderounmu 6, A. O Oluwatope

More information

To Share or not to Share

To Share or not to Share To Share or not to Share An Analysis of Incentives to Contribute in Collaborative File Sharing Environments Kavitha Ranganathan 1, Matei Ripeanu 1, Ankur Sarin 2 and Ian Foster 1,3 1 Department of Computer

More information

A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems

A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems Loubna Mekouar, Youssef Iraqi, and Raouf Boutaba University of Waterloo, Waterloo, Canada {lmekouar, iraqi, rboutaba}@bbcr.uwaterloo.ca

More information

An Empirical Study of Free-Riding Behavior in the Maze P2P File-Sharing System

An Empirical Study of Free-Riding Behavior in the Maze P2P File-Sharing System An Empirical Study of Free-Riding Behavior in the Maze P2P File-Sharing System Mao Yang Beijing University ym@net.pku.edu.cn Zheng Zhang Microsoft Research Asia zzhang@microsoft.com Xiaoming Li Beijing

More information

Analysis of peer-to-peer systems: workload characterization and effects on traffic cacheability

Analysis of peer-to-peer systems: workload characterization and effects on traffic cacheability Analysis of peer-to-peer systems: workload characterization and effects on traffic cacheability Mauro Andreolini University of Rome Tor Vergata andreolini@ing.uniroma2.it Riccardo Lancellotti University

More information

Peer-to-Peer File Sharing

Peer-to-Peer File Sharing The Effects of File Sharing on a Service Provider's Network An Industry White Paper Copyright July 2002, Sandvine Incorporated www.sandvine.com 408 Albert Street Waterloo, Ontario Canada N2L 3V3 Executive

More information

Analysis of the Traffic on the Gnutella Network

Analysis of the Traffic on the Gnutella Network Analysis of the Traffic on the Gnutella Network Kelsey Anderson University of California, San Diego CSE222 Final Project March 21 Abstract The Gnutella network is an overlay network

More information

PEER-TO-PEER NETWORK

PEER-TO-PEER NETWORK PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009 HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer

More information

Peer-to-Peer Systems: "A Shared Social Network"

Peer-to-Peer Systems: A Shared Social Network Peer-to-Peer Systems: "A Shared Social Network" Nguyen Hoang Anh Helsinki University of Technology hanguyen@cc.hut.fi Abstract In the last few years, the success of the Napster online music sharing program

More information

A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer

A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer Technology in Streaming Media College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China shuwanneng@yahoo.com.cn

More information

Three short case studies

Three short case studies Three short case studies peer to peer networking wireless systems search engines each includes issues of hardware processors, storage, peripherals, networks,... representation of information, analog vs.

More information

Performance Issues of P2P File Sharing Over Asymmetric and Wireless Networks

Performance Issues of P2P File Sharing Over Asymmetric and Wireless Networks Performance Issues of P2P File Sharing Over Asymmetric and Wireless Networks Yao-Nan Lien Computer Science Department National Chengchi University Taipei, Taiwan lien@cs.nccu.edu.tw Abstract Some Peer-to-Peer

More information

An Efficient Strategy for Data Recovery in Wi-Fi Systems

An Efficient Strategy for Data Recovery in Wi-Fi Systems International Journal of Research & Development in Science and Technology Volume 1, Issue 2, December 2014, PP 1-6 ISSN 2350-4751 (Print) & ISSN 2350-4751(Online) An Efficient Strategy for Data Recovery

More information

Enhancing Secure File Transfer by Analyzing Repeated Server Based Strategy using Gargantuan Peers (G-peers)

Enhancing Secure File Transfer by Analyzing Repeated Server Based Strategy using Gargantuan Peers (G-peers) Enhancing Secure File Transfer by Analyzing Repeated Server Based Strategy using Gargantuan Peers (G-peers) Kaushik Sekaran Assistant Professor School of Computing Science & Engineering VIT University,

More information

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar

More information

Peer-to-Peer Networks Status 2008 13th Week

Peer-to-Peer Networks Status 2008 13th Week Peer-to-Peer Networks Status 2008 13th Week Department of Computer Science 1 Peer to Peer Networks Situation 2008 2 2 Internet Traffic 1993-2004 3 3 Main Protocols 2004 Main protocols edonkey BitTorrent

More information

Online music distribution Core-Edge Working Group Meeting, September 28-29, 2004 Natalie Klym Research Associate, MIT CFP nklym@comcast.

Online music distribution Core-Edge Working Group Meeting, September 28-29, 2004 Natalie Klym Research Associate, MIT CFP nklym@comcast. Online music distribution Core-Edge Working Group Meeting, September 28-29, 2004 Natalie Klym Research Associate, MIT CFP nklym@comcast.net 2. Introduction This case study examines the implications of

More information

Analysis of traffic demographics in Broadband networks

Analysis of traffic demographics in Broadband networks White paper Analysis of traffic demographics in Broadband networks Table of Contents Background...1 Aggregate Traffic Trends...1 Upstream Traffic Trends...2 Downstream Traffic Trends...3 Summary...4 www.sandvine.com

More information

Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching

Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching 2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction

More information

Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering

More information

The Case for a Hybrid P2P Search Infrastructure

The Case for a Hybrid P2P Search Infrastructure The Case for a Hybrid P2P Search Infrastructure Boon Thau Loo Ryan Huebsch Ion Stoica Joseph M. Hellerstein University of California at Berkeley Intel Research Berkeley boonloo, huebsch, istoica, jmh @cs.berkeley.edu

More information

A Network Monitoring System with a Peer-to-Peer Architecture

A Network Monitoring System with a Peer-to-Peer Architecture A Network Monitoring System with a Peer-to-Peer Architecture Paulo Salvador, Rui Valadas University of Aveiro / Institute of Telecommunications Aveiro E-mail: salvador@av.it.pt; rv@det.ua.pt Abstract The

More information

A Reputation System for Peer-to-Peer Networks

A Reputation System for Peer-to-Peer Networks A Reputation System for Peer-to-Peer Networks Minaxi Gupta, Paul Judge, Mostafa Ammar College of Computing, Georgia Institute of Technology {minaxi, judge, ammar}@cc.gatech.edu ABSTRACT We investigate

More information

Cloud-dew architecture: realizing the potential of distributed database systems in unreliable networks

Cloud-dew architecture: realizing the potential of distributed database systems in unreliable networks Int'l Conf. Par. and Dist. Proc. Tech. and Appl. PDPTA'15 85 Cloud-dew architecture: realizing the potential of distributed database systems in unreliable networks Yingwei Wang 1 and Yi Pan 2 1 Department

More information

Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems

Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems Yao Wang, Jie Zhang, and Julita Vassileva Department of Computer Science, University of Saskatchewan,

More information

N6Lookup( title ) Client

N6Lookup( title ) Client CS 640: Introduction Networks AdityaAkella Peer-to-Peer Lecture 24 -to Computer p2p Uses Downloading: Searching Centralized Flooding Smarter Routing file of sharing p2p The (Freenet, (Gnutella, flooding

More information

P2P Filesharing Population Tracking Based on Network Flow Data

P2P Filesharing Population Tracking Based on Network Flow Data P2P Filesharing Population Tracking Based on Network Flow Data Arno Wagner, Thomas Dübendorfer, Lukas Hämmerle, Bernhard Plattner Contact: arno@wagner.name Communication Systems Laboratory Swiss Federal

More information

From Centralization to Distribution: A Comparison of File Sharing Protocols

From Centralization to Distribution: A Comparison of File Sharing Protocols From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015

More information

The Challenges of Stopping Illegal Peer-to-Peer File Sharing

The Challenges of Stopping Illegal Peer-to-Peer File Sharing The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:

More information

Load Balancing in Structured Peer to Peer Systems

Load Balancing in Structured Peer to Peer Systems Load Balancing in Structured Peer to Peer Systems DR.K.P.KALIYAMURTHIE 1, D.PARAMESWARI 2 Professor and Head, Dept. of IT, Bharath University, Chennai-600 073 1 Asst. Prof. (SG), Dept. of Computer Applications,

More information

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu Dilip Kumar Krishnappa, Samamon Khemmarat, Lixin Gao, Michael Zink University of Massachusetts Amherst,

More information

Load Balancing in Structured Peer to Peer Systems

Load Balancing in Structured Peer to Peer Systems Load Balancing in Structured Peer to Peer Systems Dr.K.P.Kaliyamurthie 1, D.Parameswari 2 1.Professor and Head, Dept. of IT, Bharath University, Chennai-600 073. 2.Asst. Prof.(SG), Dept. of Computer Applications,

More information

Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer

Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer CPSC 360 Network Programming Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer Systems Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu

More information

CITADEL: A Content Protection Architecture for Decentralized Peer-to-Peer File Sharing Systems

CITADEL: A Content Protection Architecture for Decentralized Peer-to-Peer File Sharing Systems : A Content Protection Architecture for Decentralized Peer-to-Peer File Sharing Systems Paul Judge and Mostafa Ammar College of Computing, Georgia Institute of Technology, Atlanta, GA 30332 {judge,ammar}@cc.gatech.edu

More information

State of the Art in Peer-to-Peer Performance Testing. European Advanced Networking Test Center

State of the Art in Peer-to-Peer Performance Testing. European Advanced Networking Test Center State of the Art in Peer-to-Peer Performance Testing European Advanced Networking Test Center About EANTC The European Advanced Networking Test Center (EANTC) offers vendor independent network quality

More information

McAfee Labs Threat Advisory W32/Autorun.worm.aaeb-h

McAfee Labs Threat Advisory W32/Autorun.worm.aaeb-h Summary McAfee Labs Threat Advisory W32/Autorun.worm.aaeb-h August 9, 2013 W32/Autorun.worm.aaeb-h has the ability to infect removable media devices, as well as mounted network shares. Infection starts

More information

A methodology for workload characterization of file-sharing peer-to-peer networks

A methodology for workload characterization of file-sharing peer-to-peer networks A methodology for workload characterization of file-sharing peer-to-peer networks Diêgo Nogueira, Leonardo Rocha, Juliano Santos, Paulo Araújo, Virgílio Almeida, Wagner Meira Jr. Department of Computer

More information

VoIP over P2P networks

VoIP over P2P networks VoIP over P2P networks Víctor Ramos UAM-Iztapalapa Redes y Telecomunicaciones Victor.Ramos@ieee.org http://laryc.izt.uam.mx/~vramos What is the Internet? The IP protocol suite and related mechanisms and

More information

Information Searching Methods In P2P file-sharing systems

Information Searching Methods In P2P file-sharing systems Information Searching Methods In P2P file-sharing systems Nuno Alberto Ferreira Lopes PhD student (nuno.lopes () di.uminho.pt) Grupo de Sistemas Distribuídos Departamento de Informática Universidade do

More information

Super-Consumer Based Reputation Management for Web Service Systems

Super-Consumer Based Reputation Management for Web Service Systems Super-Consumer Based Reputation Management for Web Service Systems Yao Wang, Julita Vassileva Department of Computer Science, University of Saskatchewan, Canada, e-mail:{yaw181, jiv}@cs.usask.ca Abstract

More information

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer. RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article

More information

AUTOMATED AND ADAPTIVE DOWNLOAD SERVICE USING P2P APPROACH IN CLOUD

AUTOMATED AND ADAPTIVE DOWNLOAD SERVICE USING P2P APPROACH IN CLOUD IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 4, Apr 2014, 63-68 Impact Journals AUTOMATED AND ADAPTIVE DOWNLOAD

More information

Information leakage from PC by P2P file-sharing application, Phishing and Spy ware

Information leakage from PC by P2P file-sharing application, Phishing and Spy ware Information leakage from PC by P2P file-sharing application, Phishing and Spy ware Koji Muto Institute of Systems & Information Technologies/KYUSHU 2 nd Laboratory Contents Introduction P2P file-sharing

More information

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered

More information

Peer-to-Peer (P2P) applications, including both P2P streaming and P2P

Peer-to-Peer (P2P) applications, including both P2P streaming and P2P Description of Working Group Peer-to-Peer (P2P) applications, including both P2P streaming and P2P file-sharing applications, make up a large fraction of traffic in the Internet today. One way to reduce

More information

VMware View 4 with PCoIP I N F O R M AT I O N G U I D E

VMware View 4 with PCoIP I N F O R M AT I O N G U I D E VMware View 4 with PCoIP I N F O R M AT I O N G U I D E Table of Contents VMware View 4 with PCoIP................................................... 3 About This Guide........................................................

More information

Best Practices for Controlling Skype within the Enterprise > White Paper

Best Practices for Controlling Skype within the Enterprise > White Paper > White Paper Introduction Skype is continuing to gain ground in enterprises as users deploy it on their PCs with or without management approval. As it comes to your organization, should you embrace it

More information

Understanding the Roles of Servers in Large-scale Peer-Assisted Online Storage Systems

Understanding the Roles of Servers in Large-scale Peer-Assisted Online Storage Systems Understanding the Roles of Servers in Large-scale Peer-Assisted Online Storage Systems Fangming Liu, Ye Sun, Bo Li, Xinyan Zhang Hong Kong University of Science & Technology, Roxbeam Inc. Abstract Online

More information

Decentralized Networking

Decentralized Networking Decentralized Networking 1 Indi Samarajiva www.indi.ca Abstract: In practice there are two models of computer networks, centralized and decentralized. In this proposal I will present each model and propose

More information

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška

More information

FS2You: Peer-Assisted Semi-Persistent Online Storage at a Large Scale

FS2You: Peer-Assisted Semi-Persistent Online Storage at a Large Scale FS2You: Peer-Assisted Semi-Persistent Online Storage at a Large Scale Ye Sun +, Fangming Liu +, Bo Li +, Baochun Li*, and Xinyan Zhang # Email: lfxad@cse.ust.hk + Hong Kong University of Science & Technology

More information

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Peer-to-Peer Networks 02: Napster & Gnutella Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Napster Shawn (Napster) Fanning - published 1999 his beta

More information

Evolution of Peer-to-Peer Systems

Evolution of Peer-to-Peer Systems EE 657 Lecture 9 on Sept. 28, 2007 Evolution of Peer-to-Peer Systems Peer-To-Peer Computing: Part 1 : P2P Platforms, Overlay Networks, and Gnutella Prof. kai Hwang University of Southern California Taylor

More information

A Methodology for P2P File-Sharing Traffic Detection

A Methodology for P2P File-Sharing Traffic Detection A Methodology for P2P File-Sharing Traffic Detection Angelo Spognardi, Alessandro Lucarelli, Roberto Di Pietro Università di Roma La Sapienza Dipartimento di Informatica Via Salaria, 113, 00198-Roma, Italy

More information

A Reputation Management System in Structured Peer-to-Peer Networks

A Reputation Management System in Structured Peer-to-Peer Networks A Reputation Management System in Structured Peer-to-Peer Networks So Young Lee, O-Hoon Kwon, Jong Kim and Sung Je Hong Dept. of Computer Science & Engineering, Pohang University of Science and Technology

More information

A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming

A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming Chin Yong Goh 1,Hui Shyong Yeo 1, Hyotaek Lim 1 1 Dongseo University Busan, 617-716, South Korea cgnicky@gmail.com, hui_shyong@hotmail.com,

More information

Peer-to-Peer Networks for Content Sharing

Peer-to-Peer Networks for Content Sharing Peer-to-Peer Networks for Content Sharing Choon Hoong Ding, Sarana Nutanong, and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory, Department of Computer Science and Software Engineering,

More information

Executive Brief for Sharing Sites & Digital Content Providers. Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits

Executive Brief for Sharing Sites & Digital Content Providers. Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits Executive Brief for Sharing Sites & Digital Content Providers Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits Executive Summary The Opportunity/Challenge The revenue

More information

Peer-to-Peer Replication

Peer-to-Peer Replication Peer-to-Peer Replication Matthieu Weber September 13, 2002 Contents 1 Introduction 1 2 Database Replication 2 2.1 Synchronous Replication..................... 2 2.2 Asynchronous Replication....................

More information

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT Soumya V L 1 and Anirban Basu 2 1 Dept of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, India

More information

Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining

Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining Jaswinder Kaur #1, Dr. Kanwal Garg #2 #1 Ph.D. Scholar, Department of Computer Science & Applications Kurukshetra University,

More information