(12) Patent Application Publication (10) Pub. No.: US 2016/0197831 A1 DE FOY Et Al

Total Page:16

File Type:pdf, Size:1020Kb

(12) Patent Application Publication (10) Pub. No.: US 2016/0197831 A1 DE FOY Et Al US 2016O197831A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2016/0197831 A1 DE FOY et al. (43) Pub. Date: Jul. 7, 2016 (54) METHOD AND APPARATUS FORNAME Related U.S. Application Data RESOLUTION IN SOFTWARE DEFINED (60) Provisional application No. 61/866.579, filed on Aug. NETWORKING 16, 2013, provisional application No. 61/969,566, filed on Mar. 24, 2014. (71) Applicant: InterDigital Patent Holdings, Inc., Wilmington, DE (US) Publication Classification (72) Inventors: Xavier DE FOY, Montreal (CA); Hang (51) Int. Cl. Liu, North Potomac, MD (US); Hao Jin, H04L 2/743 (2006.01) King of Prussia, PA (US) H04L 2/72 (2006.01) (52) U.S. Cl. CPC .......... H04L 45/7453 (2013.01); H04L 45/566 (73) Assignee: InterDigital Patent Holdings, Inc., (2013.01) Wilimington, DE (US) (57) ABSTRACT This disclosure relates enhancements to a SDN system (21) Appl. No.: 14/911,600 including the controller, Southbound interface, and Open Flow devices, to enable hash-routing, and describes SDN (22) PCT Fled: Aug. 8, 2014 applications making use of this feature. More specifically, the application relates to Software Defined Networking (e.g., (86) PCT NO.: PCT/US1.4/SO363 OpenFlow) enhancements to facilitate the deployment and S371 (c)(1), usage of Distributed Hash Tables, for example as part of (2) Date: Feb. 11, 2016 Information Centric Networking (ICN). Patent Application Publication Jul. 7, 2016 Sheet 1 of 25 US 2016/O197831 A1 Patent Application Publication Jul. 7, 2016 Sheet 2 of 25 US 2016/O197831 A1 ,ae ¿? Patent Application Publication Jul. 7, 2016 Sheet 3 of 25 US 2016/O197831 A1 G09—, 609—, Patent Application Publication Jul. 7, 2016 Sheet 4 of 25 US 2016/O197831 A1 |07 607---- soooooooooooooos assooooooosaaaappsos so epoNLHCl Patent Application Publication Jul. 7, 2016 Sheet 5 of 25 US 2016/O197831 A1 Patent Application Publication Jul. 7, 2016 Sheet 6 of 25 US 2016/O197831 A1 z (15559 \en: E / |||9— ()||9 Patent Application Publication Jul. 7, 2016 Sheet 7 of 25 US 2016/O197831 A1 N 9 90/ Patent Application Publication Jul. 7, 2016 Sheet 8 of 25 US 2016/O197831 A1 908 G09 908 Patent Application Publication Jul. 7, 2016 Sheet 9 of 25 US 2016/O197831 A1 Patent Application Publication Jul. 7, 2016 Sheet 10 of 25 US 2016/O197831 A1 NCIS Patent Application Publication Jul. 7, 2016 Sheet 11 of 25 US 2016/O197831 A1 |0|| Patent Application Publication Jul. 7, 2016 Sheet 12 of 25 US 2016/O197831 A1 1201 Client Application / Northbound Interface of a SDNApplication Hash-Routing aware SDN -- 1203 \Control Application (e.g. 3 ) using OpenFlow stack) w SDN Controller SDN Control (e.g. OpenFlow protocol) 1204 -1 enhanced for hash-routing control -- 1205 Hash-Routing aware / SDN Control (e.g. OF stack) - 1207 Hash-Routing aware Message forwarding -- 12O6 (e.g. Ethernet switching) or routing Packets in Packets Out SDN-Controlled Switch Router FIG. 12 Patent Application Publication Jul. 7, 2016 Sheet 13 of 25 US 2016/O197831 A1 Patent Application Publication Jul. 7, 2016 Sheet 15 of 25 US 2016/O197831 A1 15/25 y 1338 ls the hash values A - for this input and Match packet vs. flow hash function « (following existing non-HRC aiready cached - OpenFlow matching 1346 W ^ - M i 1348 procedure)d w x N- y ff Calculate the hash value (and populate internal hash value Cache with hash Retrieve hash function descriptor + hash input value + value from internal resulting hash value hash value Cache - 1350 Compare hash value with D range specification to determine the match y / s 1352 / x Packet No (packet does X matches not match flow) Nflow entry? / N : / N Yes (match found) y 1354 Update counters ? Execute instructions: / - update action set M - update packet/match set fields - update metadata 1356 - - Yes (instruction includes Goto Goto-Table n) Table n? - N 1358 Execute action set FIG. 13C Patent Application Publication Jul. 7, 2016 Sheet 16 of 25 US 2016/O197831 A1 1401 SDN COntroller 1411 Networking Router/ SWitch Router/ SWitch (HRC Cap) ) ) 8 × 8 × 8 Control Plane Connection Data Plane Connection 14O7 FIG. 14 Patent Application Publication Jul. 7, 2016 Sheet 17 of 25 US 2016/O197831 A1 1411 1401 1413 1403 1405 14O7 1409 A A A A A Z A - 1500 Networking SDN Content SDNRouter SDNROuter | | SDNROuter SDM Border Second Aod on UE6 Controller Source on 2 3 4 Router 5 Network p UE1 (HRC Cap) (HRC Cap) Initial SDN control connections setup and configuration of the network devices by the controller. In OFPT FEATURES REPLY, SDN Router 2 and Border Router 5 both specify OFPC HASH ROUTING CONTROL, while other devices do not. Based on initial phase, SDN controller is aware 1503 of devices capabilities, ... I and therefore knows . 1505 which device is HRC A Capable A 1507 Get Supported Hash Functions (e.g. NetConf • message) - - 1509 Get Supported Hash Function Inputs Methods (e.g. NetConfmessages) Get Supported Hash Functions (e.g. NetConf Get Supported Hash Function inputs Methods (e.g. NetConfmessages) Networking App uses North-Bound API of 1513 8 an SDN application 'A'. 'A' is designed to - 8 1511 make use of Hash-Routing Control. up hash-routing 1515 to split content traffic in both direction between routers 1405 and Controller set flows on SDNRouters 1405 and 1407. CCN packets are forwarded between Border Router 1409 and Router 1403 Enhanced Flow Entry Modify (hash function murmurshash;3 128bits, hash input is con-name, range=O-(2-1), destination = router 1405- this Flow F1 is placed in a flow table 'A' 1519 that is used for all traffic that is to be directed towards outside the network domain & b Enhanced Flow Entry Modify (similar to above, except range=2'-(2-1), destination router 1407- this is flow F2 S- - - s 1521 - - - - - Enhanced Flow Entry Modify (hash function murmurshash;3 128bits, hash input is con-name, A 1523 range=O-(2-1), destination router E. flow'F3' is placed in a flow table 'B' that is used for all traffic that is to be directed towards inside the network domain / Enhanced Flow: Entry Modify (similar to above, except range=2'-(2-1), destination e. router 1407- this is flow '4' 8 b f CCN Content Redest 1525 C 1N 1Ny Maw 1N 1n Thay FIG. 15A Patent Application Publication Jul. 7, 2016 Sheet 18 of 25 US 2016/O197831 A1 1500 1411 1401 1413 1403 1405 1407 1409 MN 1527 \, Match flow accepting this CCN Content Request inside the domain (action: process through flow table 'B') y Process flow "F3 - hash value is \ >264, no match. * Process flow F4 - same hash value leads to a match this time. Action: forward towards router-4 1533, CCN Content Request y - 1531 The content object is not found in cache. Normal CCN forwarding towards Router 2 CCN Content Request s s Normal CCN forwarding towards s 1539 s Content Source 1535 YdCN Content Request 1537 H 1541 s-CBN Content Resppnse Match flow accepting this CCN Content Response to leave the -- 1543 domain (action: process through flow table 'A') I Process flow F1 - hash walue is >2^64, no match. 1545 Process flow 'F2 - same hash - value leads to a match this time. Action: forward towards router-4 1547 CCN Content Response - a Normal CCN forwarding towards Border Router 5 (Router 4 may - 1549 also cache the content object for later use) CCN Content Respnse ^ ^ Normal CCN forwarding 1551 - upstream towards requester f ccN content Respnse 553 } $ 1555 FIG. 15B Patent Application Publication Jul. 7, 2016 Sheet 19 of 25 US 2016/O197831 A1 1411 1401 - 1413 1403 1405 1407 1409 - 1500 Networking SDM Content SDNRouter son Router SN Router SDN Border second Aodon UE6 || controller | SC 2 3 4. Router 5 Network pp UE1 (HRC Cap) (HRC Cap) Initial SDN control Connections setup and configuration of the network devices by the controller. In OFPT FEATURES REPLY, SDNRouter 2 and Border Router 5 both specify OFPC HASH ROUTING CONTROL, while other devices do not. x Based on initial phase, \ SDN Controller is - 1503 \ 1501 aware of devices - capabilities, and therefore knows which 1505 device is HRC Capable ^ GetSupported Hash Functions (e.g NetConfmessage) 1507 s. i ^ Get Supported Hash Function inputs Methods (e.g. NetConfmessages 1509 se ? GetSupported Hash Functions (e.g. NetConfmessage) / e Get Supported Hash Function inputs Methods (e.g. NetConfmessages & w e Networking App uses North-Bound API of an || - 1513 \ 1511 SDN application 'A'. 'A' is designed to make use of Hash-Routing Control. 'A' decides to set up hash-routing to split Content traffic in both direction between routers - 1515 3 and 4 (e.g. for load 1517 balancing) ? Controller set flows on SDNRouters 3 and 4: CCN packets are forwarded between Border Router 5 and Router 2 Controller configures Function ID #0 to use Murmurh Hash3-64bits with CCNX object name as input --- 1619 Controller sets (1) flow F1 matching CCN traffic leaving the domain with Apply-Action HRC-Function ID #0 to table 12, and (2) 2 flows in table 12 splitting the traffic between router #3 and #4 based on metadata value 1621 Controller configures Functioh ID #0 to use Murmurhhash3-64-bits with CCNxobject name as input is 1623 Controller sets (1) flow F2 matching CCN traffic leaving the domain with Apply-Action "HRC-Function" ID #0 totable 12, and (2) 2 flows in table 12, splitting the traffic between router #3 and #4 based on metadata value (same splitting than in Router 2: i.e. same F. is allocated to router-3 (resp. router-4) in Router 2 and Router 5) < ‘. b 1625 1N 1n 1N an 1Ny MN MN 1N FIG.
Recommended publications
  • Distributed Hash Table Implementation to Enable Security and Combat Malpractices
    International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248 Volume: 5 Issue: 2 09 – 12 _______________________________________________________________________________________________ Distributed Hash Table Implementation to Enable Security and Combat Malpractices Dr. T. Venkat Narayana Rao K. Vivek C. Pranita Professor, CSE, Student , CSE, Student , CSE, Sreenidhi Institute of Science and Sreenidhi Institute of Science and Sreenidhi Institute of Science and Technology Technology Technology Yamnampet, Hyderabad, India Yamnampet, Hyderabad, India Yamnampet, Hyderabad, India Abstract: Security has become a global problem in any field. Everyday millions of cyber crimes are being recorded worldwide. Many of them include unethical hacking, unauthorized hampering of files and many more. To avoid such malicious practices many technologies have come up. One such security is DHT or Distributed hash tables. A recently upcoming cyber security, it helps the receiver and sender to send and receive files that are authentic. It also helps to find out if the file is manipulated or tampered by a third party or an unauthorized user by generating unique hash values. This paper mainly focuses on such distributed networks and the security they provide in order to stop malpractices. Keywords: Distributed Hash Value (DHT), Peer to Peer Network, Hashing Algorithms. __________________________________________________*****_________________________________________________ I. Introduction like service over a network where it is distributed, where it We are becoming technologically advanced day by day. provides access to a key value which is commonly shared. With increasing technology the need to be secured has also The key value is distributed over nodes participating in the been increased. Online security and authentication have network with great performance and scalability.
    [Show full text]
  • Good Money Still Going Bad: Digital Thieves and the Hijacking of the Online Ad Business
    GOOD MONEY STILL GOING BAD: DIGITAL THIEVES AND THE HIJACKING OF THE ONLINE AD BUSINESS A FOLLOW-UP TO THE 2014 REPORT ON THE PROFITABILITY OF AD-SUPPORTED CONTENT THEFT MAY 2015 @4saferinternet A safer internet is a better internet CONTENTS CONTENTS ......................................................................................................................................................................................................................ii TABLE OF REFERENCES ..................................................................................................................................................................................iii Figures.........................................................................................................................................................................................................................iii Tables ...........................................................................................................................................................................................................................iii ABOUT THIS REPORT ..........................................................................................................................................................................................1 EXECUTIVE SUMMARY ..................................................................................................................................................................................... 2 GOOD MONEY STILL GOING BAD
    [Show full text]
  • Unveiling the I2P Web Structure: a Connectivity Analysis
    Unveiling the I2P web structure: a connectivity analysis Roberto Magan-Carri´ on,´ Alberto Abellan-Galera,´ Gabriel Macia-Fern´ andez´ and Pedro Garc´ıa-Teodoro Network Engineering & Security Group Dpt. of Signal Theory, Telematics and Communications - CITIC University of Granada - Spain Email: [email protected], [email protected], [email protected], [email protected] Abstract—Web is a primary and essential service to share the literature have analyzed the content and services offered information among users and organizations at present all over through this kind of technologies [6], [7], [2], as well as the world. Despite the current significance of such a kind of other relevant aspects like site popularity [8], topology and traffic on the Internet, the so-called Surface Web traffic has been estimated in just about 5% of the total. The rest of the dimensions [9], or classifying network traffic and darknet volume of this type of traffic corresponds to the portion of applications [10], [11], [12], [13], [14]. Web known as Deep Web. These contents are not accessible Two of the most popular darknets at present are The Onion by search engines because they are authentication protected Router (TOR; https://www.torproject.org/) and The Invisible contents or pages that are only reachable through the well Internet Project (I2P;https://geti2p.net/en/). This paper is fo- known as darknets. To browse through darknets websites special authorization or specific software and configurations are needed. cused on exploring and investigating the contents and structure Despite TOR is the most used darknet nowadays, there are of the websites in I2P, the so-called eepsites.
    [Show full text]
  • Digital Citizens Alliance
    GOOD MONEY STILL GOING BAD: DIGITAL THIEVES AND THE HIJACKING OF THE ONLINE AD BUSINESS A FOLLOW-UP TO THE 2013 REPORT ON THE PROFITABILITY OF AD-SUPPORTED CONTENT THEFT MAY 2015 A safer internet is a better internet CONTENTS CONTENTS ......................................................................................................................................................................................................................ii TABLE OF REFERENCES ..................................................................................................................................................................................iii Figures.........................................................................................................................................................................................................................iii Tables ...........................................................................................................................................................................................................................iii ABOUT THIS REPORT ..........................................................................................................................................................................................1 EXECUTIVE SUMMARY ..................................................................................................................................................................................... 2 GOOD MONEY STILL GOING BAD ........................................................................................................................................................3
    [Show full text]
  • List of Search Engines
    A blog network is a group of blogs that are connected to each other in a network. A blog network can either be a group of loosely connected blogs, or a group of blogs that are owned by the same company. The purpose of such a network is usually to promote the other blogs in the same network and therefore increase the advertising revenue generated from online advertising on the blogs.[1] List of search engines From Wikipedia, the free encyclopedia For knowing popular web search engines see, see Most popular Internet search engines. This is a list of search engines, including web search engines, selection-based search engines, metasearch engines, desktop search tools, and web portals and vertical market websites that have a search facility for online databases. Contents 1 By content/topic o 1.1 General o 1.2 P2P search engines o 1.3 Metasearch engines o 1.4 Geographically limited scope o 1.5 Semantic o 1.6 Accountancy o 1.7 Business o 1.8 Computers o 1.9 Enterprise o 1.10 Fashion o 1.11 Food/Recipes o 1.12 Genealogy o 1.13 Mobile/Handheld o 1.14 Job o 1.15 Legal o 1.16 Medical o 1.17 News o 1.18 People o 1.19 Real estate / property o 1.20 Television o 1.21 Video Games 2 By information type o 2.1 Forum o 2.2 Blog o 2.3 Multimedia o 2.4 Source code o 2.5 BitTorrent o 2.6 Email o 2.7 Maps o 2.8 Price o 2.9 Question and answer .
    [Show full text]
  • Resource Monitoring for the Detection of Parasite P2P Botnets ⇑ Rafael A
    Computer Networks 70 (2014) 302–311 Contents lists available at ScienceDirect Computer Networks journal homepage: www.elsevier.com/locate/comnet Resource monitoring for the detection of parasite P2P botnets ⇑ Rafael A. Rodríguez-Gómez a, , Gabriel Maciá-Fernández a, Pedro García-Teodoro a, Moritz Steiner b, Davide Balzarotti c a Dpt. of Signal Theory, Telematics and Communications, CITIC-UGR, Spain b Bell Labs, Alcatel-Lucent, Murray Hill, NJ, USA c EURECOM, Biot, France article info abstract Article history: Detecting botnet behaviors in networks is a popular topic in the current research literature. Received 24 December 2013 The problem of detection of P2P botnets has been denounced as one of the most difficult Accepted 28 May 2014 ones, and this is even sounder when botnets use existing P2P networks infrastructure (par- Available online 20 June 2014 asite P2P botnets). The majority of the detection proposals available at present are based on monitoring network traffic to determine the potential existence of command-and-control Keywords: communications (C&C) between the bots and the botmaster. As a different and novel Parasite botnet approach, this paper introduces a detection scheme which is based on modeling the evo- Detection system lution of the number of peers sharing a resource in a P2P network over time. This allows Peer-to-peer Mainline to detect abnormal behaviors associated to parasite P2P botnet resources in this kind of environments. We perform extensive experiments on Mainline network, from which promising detection results are obtained while patterns of parasite botnets are tentatively discovered. Ó 2014 Elsevier B.V. All rights reserved.
    [Show full text]
  • 2000-Deep-Web-Dark-Web-Links-2016 On: March 26, 2016 In: Deep Web 5 Comments
    Tools4hackers -This You website may uses cookies stop to improve me, your experience. but you We'll assume can't you're ok stop with this, butus you all. can opt-out if you wish. Accept Read More 2000-deep-web-dark-web-links-2016 on: March 26, 2016 In: Deep web 5 Comments 2000 deep web links The Dark Web, Deepj Web or Darknet is a term that refers specifically to a collection of websites that are publicly visible, but hide the IP addresses of the servers that run them. Thus they can be visited by any web user, but it is very difficult to work out who is behind the sites. And you cannot find these sites using search engines. So that’s why we have made this awesome list of links! NEW LIST IS OUT CLICK HERE A warning before you go any further! Once you get into the Dark Web, you *will* be able to access those sites to which the tabloids refer. This means that you could be a click away from sites selling drugs and guns, and – frankly – even worse things. this article is intended as a guide to what is the Dark Web – not an endorsement or encouragement for you to start behaving in illegal or immoral behaviour. 1. Xillia (was legit back in the day on markets) http://cjgxp5lockl6aoyg.onion 2. http://cjgxp5lockl6aoyg.onion/worldwide-cardable-sites-by-alex 3. http://cjgxp5lockl6aoyg.onion/selling-paypal-accounts-with-balance-upto-5000dollars 4. http://cjgxp5lockl6aoyg.onion/cloned-credit-cards-free-shipping 5. 6. ——————————————————————————————- 7.
    [Show full text]
  • The Onion Crate - Tor Hidden Service Index
    onion.to does not host this content; we are simply a conduit connecting Internet users to content hosted inside the Tor network.. onion.to does not provide any anonymity. You are strongly advised to download the Tor Browser Bundle and access this content over Tor. For more information see our website for more details and send us your feedback. hide Tor2web header Online onions The Onion Crate - Tor Hidden Service Index nethack3dzllmbmo.onion A public nethack server. j4ko5c2kacr3pu6x.onion/wordpress Paste or blog anonymously, no registration required. redditor3a2spgd6.onion/r/all Redditor. Sponsored links 5168 online onions. (Ctrl-f is your friend) A AUTOMATED PAYPAL AND CREDIT CARD MARKET 2222bbbeonn2zyyb.onion A Beginner Friendly Comprehensive Guide to Installing and Using A Safer yuxv6qujajqvmypv.onion A Coca Growlog rdkhliwzee2hetev.onion ==> https://freenet7cul5qsz6.onion.to/freenet:USK@yP9U5NBQd~h5X55i4vjB0JFOX P97TAtJTOSgquP11Ag,6cN87XSAkuYzFSq-jyN- 3bmJlMPjje5uAt~gQz7SOsU,AQACAAE/cocagrowlog/3/ A Constitution for the Few: Looking Back to the Beginning ::: Internati 5hmkgujuz24lnq2z.onion ==> https://freenet7cul5qsz6.onion.to/freenet:USK@kpFWyV- 5d9ZmWZPEIatjWHEsrftyq5m0fe5IybK3fg4,6IhxxQwot1yeowkHTNbGZiNz7HpsqVKOjY 1aZQrH8TQ,AQACAAE/acftw/0/ A Declaration of the Independence of Cyberspace ufbvplpvnr3tzakk.onion ==> https://freenet7cul5qsz6.onion.to/freenet:CHK@9NuTb9oavt6KdyrF7~lG1J3CS g8KVez0hggrfmPA0Cw,WJ~w18hKJlkdsgM~Q2LW5wDX8LgKo3U8iqnSnCAzGG0,AAIC-- 8/Declaration-Final%5b1%5d.html A Dumps Market - Dumps, Cloned Cards,
    [Show full text]
  • Disney Princess Enchanted Journey Game Free Download
    Disney princess enchanted journey game free download Continue Pc Game Free download Need For Speed4246 MB About the game Meet and interact with popular Disney princesses, expanding their creativity and exploring important topics such as courage, friendship, trust and discovery. Set up your own unique character heroine and enter an exciting adventure through four fun levels. Help these amazing princesses to bring order to their enchanted kingdoms and overcome the forces of evil. Summary You can make friends and interact with Cinderella, Ariel, Snow White and Jasmine. Every Disney princess in the game has its own history and a magical world that is waiting to be explored. Disney Princess Enchanted Journey review. Disney Princess Enchanted Journey Free Download for PC is a video game franchise Disney Princess, which was released for PlayStation 2, Wii and PC in 2007. August 19, 2015 Disney Princess Enchanted Journey Full review of PC game. Disney Princess Enchanted Journey Download Free Full Game is a video game franchise disney Princess, which was released for PlayStation 2, Wii and PC. Disney Princess: My Fairy Tale. Disney Princess: My Tale of The Adventures of PC/MAC. Features. Disney-Pixar Brave: Video games run, jump. Pc Game Free Download Need For SpeedAs You create your own princess character, you will be able to choose dresses, accessories, hair, skin tone, eye color and even her name. With beautiful levels to explore and exciting elements of adventure, this one game is sure to please the princess in you. Minimum:. OS: Windows XP. Processor: Pentium 4 or AMD Athlon XP 1.4 GHz.
    [Show full text]
  • Bittorrent (Protocol) 1 Bittorrent (Protocol)
    BitTorrent (protocol) 1 BitTorrent (protocol) BitTorrent is a peer-to-peer file sharing protocol used for distributing large amounts of data over the Internet. BitTorrent is one of the most common protocols for transferring large files and it has been estimated that peer-to-peer networks collectively have accounted for roughly 43% to 70% of all Internet traffic (depending on geographical location) as of February 2009.[1] Programmer Bram Cohen designed the protocol in April 2001 and released a first implementation on July 2, 2001.[2] It is now maintained by Cohen's company BitTorrent, Inc. There are numerous BitTorrent clients available for a variety of computing platforms. As of January 2012 BitTorrent has 150 million active users according to BitTorrent Inc.. Based on this the total number of monthly BitTorrent users can be estimated at more than a quarter billion.[3] At any given instant of time BitTorrent has, on average, more active users than YouTube and Facebook combined. (This refers to the number of active users at any instant and not to the total number of unique users.)[4][5] Description The BitTorrent protocol can be used to reduce the server and network impact of distributing large files. Rather than downloading a file from a single source server, the BitTorrent protocol allows users to join a "swarm" of hosts to download and upload from each other simultaneously. The protocol is an alternative to the older single source, multiple mirror sources technique for distributing data, and can work over networks with lower bandwidth so many small computers, like mobile phones, are able to efficiently distribute files to many recipients.
    [Show full text]
  • An Introduction to Computer Networks Stanford Univ CS144 Fall 2012
    An Introduction to Computer Networks Stanford Univ CS144 Fall 2012 PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Tue, 09 Oct 2012 17:42:20 UTC Contents Articles --WEEK ONE-- 1 Introduction 2 Internet 2 What the Internet is 20 Internet protocol suite 20 OSI model 31 Internet Protocol 39 Transmission Control Protocol 42 User Datagram Protocol 59 Internet Control Message Protocol 65 Hypertext Transfer Protocol 68 Skype protocol 75 BitTorrent 81 Architectural Principles 95 Encapsulation (networking) 95 Packet switching 96 Hostname 100 End-to-end principle 102 Finite-state machine 107 --END WEEK ONE-- 118 References Article Sources and Contributors 119 Image Sources, Licenses and Contributors 124 Article Licenses License 125 1 --WEEK ONE-- 2 Introduction Internet Routing paths through a portion of the Internet as visualized by the Opte Project General Access · Censorship · Democracy Digital divide · Digital rights Freedom · History · Network neutrality Phenomenon · Pioneers · Privacy Sociology · Usage Internet governance Internet Corporation for Assigned Names and Numbers (ICANN) Internet Engineering Task Force (IETF) Internet Governance Forum (IGF) Internet Society (ISOC) Protocols and infrastructure Domain Name System (DNS) Hypertext Transfer Protocol (HTTP) IP address Internet exchange point Internet Protocol (IP) Internet Protocol Suite (TCP/IP) Internet service provider (ISP) Simple Mail Transfer Protocol (SMTP) Services Blogs · Microblogs · E-mail Fax · File sharing · File transfer Instant messaging · Gaming Podcast · TV · Search Shopping · Voice over IP (VoIP) Internet 3 World Wide Web Guides Outline Internet portal The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (often called TCP/IP, although not all applications use TCP) to serve billions of users worldwide.
    [Show full text]
  • Bittorrent - Wikipedia, the Free Encyclopedia 11/12/13 Create Account Log In
    BitTorrent - Wikipedia, the free encyclopedia 11/12/13 Create account Log in Article Talk Read Edit View history BitTorrent From Wikipedia, the free encyclopedia Main page Contents This article is about the file sharing protocol. For other uses, see BitTorrent (disambiguation). Featured content This article may be too technical for most readers to Current events understand. Please help improve this article to make it Random article understandable to non-experts, without removing the technical Donate to Wikipedia details. The talk page may contain suggestions. (May 2011) Wikimedia Shop BitTorrent is a protocol supporting the practice of Part of a series on Interaction peer-to-peer file sharing that is used to distribute large File sharing Help amounts of data over the Internet. BitTorrent is one of About Wikipedia the most common protocols for transferring large files, Community portal and peer-to-peer networks have been estimated to Recent changes collectively account for approximately 43% to 70% of Technologies Contact page all Internet traffic (depending on geographical location) Peer to peer · BitTorrent­ · Tools as of February 2009.[1] In November 2004, BitTorrent ­File hosting services was responsible for 35% of all Internet traffic.[2] As of Development and societal aspects Print/export February 2013, BitTorrent was responsible for 3.35% Timeline · Legal­ aspects Non-public file sharing Languages of all worldwide bandwidth, more than half of the 6% Anonymous P2P Friend-to-friend­ Darknet­ of total bandwidth dedicated to file sharing.[3] · · · Private P2P­ العربية Azərbaycanca Programmer Bram Cohen, a former University at File sharing networks and services [4] Беларуская Buffalo graduate student in Computer Science, Gnutella / Gnutella2 (G2) · FastTrack­ · Български designed the protocol in April 2001 and released the ­eDonkey · Direct­ Connect · Mininova­ · ­isoHunt The­ Pirate Bay ­Bitcoin Bosanski first available version on July 2, 2001,[5] and the final · · [6] By country or region Català version in 2008.
    [Show full text]