Mechanisms, Models, and Tools for Flexible Protocol Development and Accurate Network Experimentation

Total Page:16

File Type:pdf, Size:1020Kb

Mechanisms, Models, and Tools for Flexible Protocol Development and Accurate Network Experimentation Mechanisms, Models, and Tools for Flexible Protocol Development and Accurate Network Experimentation Von der Fakult¨at fur¨ Mathematik, Informatik und Naturwissenschaften der RWTH Aachen University zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften genehmigte Dissertation vorgelegt von M.S. Computer Science (USA) Olaf Landsiedel aus Mainz Berichter: Prof. Dr.-Ing. Klaus Wehrle Prof. PhD Anthony D. Joseph Tag der mundlichen¨ Prufung:¨ 22. M¨arz 2010 Diese Dissertation ist auf den Internetseiten der Hochschulbibliothek online verfugbar.¨ WICHTIG: D 82 überprüfen !!! Reports on Communications and Distributed Systems edited by Prof. Dr.-Ing. Klaus Wehrle Communication and Distributed Systems, RWTH Aachen University Volume 1 Olaf Landsiedel Mechanisms, Models, and Tools for Flexible Protocol Development and Accurate Network Experimentation Shaker Verlag Aachen 2010 Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data are available in the Internet at http://dnb.d-nb.de. Zugl.: D 82 (Diss. RWTH Aachen University, 2010) Copyright Shaker Verlag 2010 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the publishers. Printed in Germany. ISBN 978-3-8322-9451-9 ISSN 2191-0863 Shaker Verlag GmbH • P.O. BOX 101818 • D-52018 Aachen Phone: 0049/2407/9596-0 • Telefax: 0049/2407/9596-9 Internet: www.shaker.de • e-mail: [email protected] Acknowledgements First of all, I want to thank Klaus for hiring me as a young, green PhD student. Thank you for advising me and giving me the opportunity to work in your group. The creative atmosphere, trust, and independence allowed me to realize ideas, gather experience, and to develop as a person. I was allowed to try, to fail, and sometimes to succeed. Working with Klaus introduced me to many different areas in computer networking and I established a wide background and experience. I believe that this wide experi- ence was a key requirement for this thesis, as my work addresses generic techniques for protocol development and evaluation. However, doing a PhD is much more than research: I was introduced to teaching, advising thesis students, paper and proposal writing, and organization. Yet, I still do not know how to make coffee. I want to thank all colleagues for making this group such a pleasant environment for research and for the great years in Aachen and Tubingen.¨ Special thanks go to Hamad, Stefan, Georg, Jo, Tobi, and Raimondas for the long discussions and joint work on many ideas. Furthermore, I want to thank all my thesis students and Hiwis: Without you this work would not have been possible. I am happy that many of you got interested in research and very proud that some of you even became my colleagues and are now working in the Distributed Systems Group. Finally, I would like to thank my family and friends for their love, friendship, and support. Especially, I thank my wife Anna for her love, support, kindness, and understanding. Thank you all for many wonderful years as a PhD student. Curriculum Vitae About Me Name Landsiedel Forename Olaf Date of birth 2nd of March 1979 Place of birth Mainz, Germany Nationality German Education High School 1989 - 1998 Gymnasium Altenholz Abitur: June 1998 University 10/1999 - 07/2002 Christian-Albrechts-Universit¨at zu Kiel Major: Computer Science (Minor: Business) Pre-Diploma: 2001 University 7/2002 - 12/2003 University of Kansas Department of Electrical Engineering and Computer Science Degree: MS Computer Science, with honors PhD Student 3/2004 - 4/2006 University of Tubingen¨ Protokoll Engineering und Verteilte Systeme Advisor: Dr.-Ing. Klaus Wehrle PhD Student 5/2006 - 2/2010 RWTH Aachen University LuFG Informatik IV - Verteilte Systeme Advisor: Prof. Dr.-Ing. Klaus Wehrle Contents 1 Introduction 1 1.1ProblemStatement............................ 2 1.1.1 Diversity and Customization of Communication Protocols . 2 1.1.2 Complexity of Protocol Evaluation ............... 3 1.1.3 LackofRealismandAccuracyinNetworkSimulation..... 4 1.2 Objectives and Contributions ...................... 5 1.2.1 RapidProtocolDevelopmentfromMicroProtocols...... 5 1.2.2 Flexible Network Experimentation ............... 6 1.2.3 Accurate Simulation through Fine-Grained Calibration .... 6 1.3 Outline ................................... 7 2 Fundamentals and Analysis 9 2.1TheInternet................................ 9 2.1.1 InternetArchitecture....................... 9 2.1.2 ProtocolsintheEarlyInternet................. 10 2.2IncreasingProtocolDiversityandFunctionality............ 11 2.2.1 ProtocolDiversityintoday’sInternet.............. 11 2.2.2 RapidProtocolDevelopmentfromMicroProtocols...... 14 2.2.3 StateoftheArt.......................... 15 2.2.4 Discussion.............................15 2.2.5 Summary ............................. 16 2.3DiversityofPlatformsandTools..................... 17 2.3.1 Vision............................... 17 2.3.2 ProtocolDevelopmentCycle................... 18 2.3.3 Flexible Network Experimentation through Platform Abstrac- tion................................ 22 2.3.4 StateoftheArt.......................... 23 2.3.5 Discussion.............................23 2.3.6 Summary ............................. 24 2.4InaccuracyinNetworkSimulation.................... 24 2.4.1 ChallengesinNetworkSimulation................ 24 2.4.2 Accurate Simulation through Fine-Grained Calibration .... 25 2.4.3 StateoftheArt.......................... 25 2.4.4 Discussion.............................26 2.4.5 Summary ............................. 27 2.5Conclusion................................. 27 3 Micro-Protocols as Substrate for Protocol Composition 29 3.1ComponentModel............................ 30 3.1.1 Granularity of Modularization .................. 30 3.1.2 MicroProtocols:OuterLayeroftheComponentModel.... 31 3.1.3 Configurations: The Inner Layer of the Component Model . 34 3.1.4 Discussion.............................35 3.1.5 Example .............................. 36 3.1.6 Summary ............................. 38 3.2 Case Study: Micro Protocols and Configurations in Transport Protocols 38 3.2.1 WidespreadTransportProtocols................. 38 3.2.2 DetectionofPacketLoss..................... 44 3.2.3 Reliable Communication ..................... 49 3.2.4 RoundTripTimeEstimation.................. 50 3.2.5 CongestionControl........................ 52 3.2.6 FlowControl........................... 56 3.2.7 Window Management ...................... 58 3.2.8 Explicit Congestion Notification ................. 61 3.2.9 FurtherMicro-Protocols..................... 63 3.2.10 Summary ............................. 63 3.3ComposingTransportProtocols..................... 64 3.3.1 Transmission Control Protocol (TCP) .............. 64 3.3.2 DatagramCongestionControlProtocol............. 68 3.3.3 StreamControlTransmissionProtocol............. 72 3.3.4 FurtherTransportProtocols .................. 75 3.3.5 Summary ............................. 76 3.4Evaluation................................. 77 3.4.1 Flexible Composition of Protocol Mechanisms ......... 77 3.4.2 ProtocolExperimentationandHypotheticalProtocols..... 82 3.4.3 InternetProtocolStacks..................... 85 3.4.4 EvaluationofReuseinProtocolCompositions......... 87 3.4.5 Discussion.............................88 3.5RelatedWork............................... 90 3.5.1 Modular Communication Systems ................ 90 3.5.2 Modular and Configurable Network Protocols ......... 91 3.5.3 ConfigurableTransportProtocols................ 92 3.5.4 Discussion.............................92 3.6Conclusion................................. 92 3.6.1 FutureDirections......................... 93 3.6.2 Summary ............................. 94 4 Protocol Factory 97 4.1IntroducingtheProtocolFactory.................... 97 4.1.1 SoftwareArchitectureforMicroProtocols........... 98 4.1.2 VirtualPlatformforExperimentation(VIPE)......... 99 4.2SoftwareArchitectureforMicroProtocols............... 99 4.2.1 DesignGoals........................... 99 4.2.2 AnalysisofDesignChoices....................101 4.2.3 Modules as Functional Building Blocks .............104 4.2.4 ProtocolComposition......................106 4.2.5 DynamicProtocolCompositions.................109 4.2.6 Auxiliary Functionality ......................110 4.2.7 Optimizing Protocol Stacks ...................111 4.2.8 ProFabToolChain........................113 4.2.9 Conclusion.............................114 4.3AVirtualPlatformforNetworkExperimentation...........115 4.3.1 Analysis..............................116 4.3.2 OverviewandGoals.......................117 4.3.3 ArchitectureoftheVirtualPlatform..............120 4.3.4 Conclusion.............................126 4.4Evaluation.................................126 4.4.1 VirtualPlatform.........................127 4.4.2 SoftwareArchitectureforMicroProtocols...........128 4.4.3 OverallPerformanceofProFab.................133 4.4.4 Summary .............................133 4.5RelatedWork...............................135 4.5.1 Software Architectures for Communication Protocols .....135 4.5.2 VirtualPlatform.........................135 4.5.3 Summary .............................137 4.6Conclusion.................................137 4.6.1 ProtocolExperimentationwithProFab.............137 4.6.2 Limitations and Lessons Learned ................140
Recommended publications
  • Petter Sandvik Formal Modelling for Digital Media Distribution
    Petter Sandvik Formal Modelling for Digital Media Distribution Turku Centre for Computer Science TUCS Dissertations No 206, November 2015 Formal Modelling for Digital Media Distribution Petter Sandvik To be presented, with the permission of the Faculty of Science and Engineering at Åbo Akademi University, for public criticism in Auditorium Gamma on November 13, 2015, at 12 noon. Åbo Akademi University Faculty of Science and Engineering Joukahainengatan 3-5 A, 20520 Åbo, Finland 2015 Supervisors Associate Professor Luigia Petre Faculty of Science and Engineering Åbo Akademi University Joukahainengatan 3-5 A, 20520 Åbo Finland Professor Kaisa Sere Faculty of Science and Engineering Åbo Akademi University Joukahainengatan 3-5 A, 20520 Åbo Finland Reviewers Professor Michael Butler Electronics and Computer Science Faculty of Physical Sciences and Engineering University of Southampton Highfield, Southampton SO17 1BJ United Kingdom Professor Gheorghe S, tefănescu Computer Science Department University of Bucharest 14 Academiei Str., Bucharest, RO-010014 Romania Opponent Professor Michael Butler Electronics and Computer Science Faculty of Physical Sciences and Engineering University of Southampton Highfield, Southampton SO17 1BJ United Kingdom ISBN 978-952-12-3294-7 ISSN 1239-1883 To tose who are no longr wit us, and to tose who wil be here afer we are gone i ii Abstract Human beings have always strived to preserve their memories and spread their ideas. In the beginning this was always done through human interpretations, such as telling stories and creating sculptures. Later, technological progress made it possible to create a recording of a phenomenon; first as an analogue recording onto a physical object, and later digitally, as a sequence of bits to be interpreted by a computer.
    [Show full text]
  • “Is the Internet Healthy”
    When Want & Freedom Collide Finding a Fair Internet Capacity Sharing Solution Executive Summary Problems with the way the Internet shares capacity are surfacing. Net neutrality is high on the political agenda in the US and the Internet technical community recently accepted that the traditional way the Internet shares out capacity is not a way forward. A radical new approach called 'congestion exposure' or 'cost transparency' is building a head of steam for Internet standardization. But this issue is not just a matter for technical committees to decide; it impacts global business and public policy too. When chief executives of the worlds ICT firms met at the GIIC annual commissioner meeting in April '09, they were briefed on the new approach, proposed by researchers in BT. Intuitively they liked the idea, but they wanted to hear experts assess its potential impact, in depth, before putting their support behind it. On 30 September 09, experts from around the world converged on the GIIC-organized workshop in London to assess the proposal, from the three perspectives: commercial, public policy and technical. The workshop was hosted by BT, with CTOs and CEOs of GIIC member companies or their expert representatives also attending, plus a few joining over video or audio links. There were positive and often deeply considered comments about the proposal from all those who attended, included assessment of it in their talks: Dr David Clark (MIT and former IETF Chief Protocol Architect), Rich Woundy (Comcast office of the CTO), Prof Christopher Yoo (Penn Law), Leslie Daigle (CITO of ISOC), Kevin Mason (Telecom NZ), Don Bowman (CTO Sandvine), Eric Klinker (CTO BitTorrent) and Falk von Bornstaedt (Head of Peering Strategy, DT).
    [Show full text]
  • Project Maelstrom: Forensic Analysis of the Bittorrent-Powered
    Project Maelstrom: Forensic Analysis of the BitTorrent-Powered ... JDFSL V10N4 PROJECT MAELSTROM: FORENSIC ANALYSIS OF THE BITTORRENT-POWERED BROWSER Jason Farina, M-Tahar Kechadi, Mark Scanlon School of Computer Science, University College Dublin, Ireland. [email protected], {tahar.kechadi, mark.scanlon}@ucd.ie ABSTRACT In April 2015, BitTorrent Inc. released their distributed peer-to-peer powered browser, Project Maelstrom, into public beta. The browser facilitates a new alternative website dis- tribution paradigm to the traditional HTTP-based, client-server model. This decentralised web is powered by each of the visitors accessing each Maelstrom hosted website. Each user shares their copy of the website;s source code and multimedia content with new visitors. As a result, a Maelstrom hosted website cannot be taken oine by law enforcement or any other parties. Due to this open distribution model, a number of interesting censorship, secu- rity and privacy considerations are raised. This paper explores the application, its protocol, sharing Maelstrom content and its new visitor powered web-hosting paradigm. Keywords: Project Maelstrom, BitTorrent, decentralised web, alternative web, browser forensics 1. INTRODUCTION as: Truly an Internet powered by peo- Project Maelstrom was released as a private ple, one that lowers barriers and alpha in December 2014 [Klinker, 2014] and denies gatekeepers their grip on our as a public beta in April 2015 [Klinker, 2015]. future [Klinker, 2014]. Its purpose is to provide a decentralised web ecosystem
    [Show full text]
  • University of Groningen Decentralized Link Sharing, Towards A
    University of Groningen Decentralized Link Sharing, Towards a Framework for Decentralized Applications Master Thesis Laurence de Jong August 17, 2015 Supervisors: prof. dr. ir. M. (Marco) Aiello dr. A. (Alexander) Lazovik Research performed at Media2B, under supervision of: dr. B. (Berco) Beute dr. H. (Henk) Doornbos Acknowledgments First, I would like to express my sincere gratitude to Berco and Henk, for introducing me to the topic and for their daily guidance and inspiration. I would like to thank my supervisors, prof. Marco Aiello and dr. Alexander Lazovik, for allowing me to perform research on this subject. I thank Leon and Nykle for their feedback and discussions. I would like to thank my girlfriend for listening to my endless rambling about technology. Lastly, I would like to thank all others who have supported me. Laurence de Jong Groningen August 17, 2015 iii Abstract The current internet is ruled by centralized entities. These central entities are trusted with users’ data in good faith. However, services shut down, data is not always protected, and govern- ments perform mass surveillance (ab)using these easy targets. Another issue is that when a service becomes more popular, more resources are required. However, the users of a service often have unused resources, like disk space and bandwidth, available. In an attempt to solve these issues, decentralization is mentioned as a possible solution. To discover what the archi- tecture of a decentralized solution should be, a common use case on the internet is selected: link sharing. Reddit is the best known link sharing website. Reddit suffers from its popularity and controls a huge amount of data, data which is created by its users.
    [Show full text]
  • Ipv6 Deployment: the Internet Society As Part of Its Fellowship to the IETF Programme
    Volume 4, Issue 2 IETF Journal October 2008 A report from IETF 72, July 2008, Dublin, Ireland. Published by the Internet Society in cooperation with Inside this issue the Internet Engineering Task Force* Focus on IPv6 at IETF 72 ................. 1 Focus on IPv6 at IETF 72 IETF Meetings Related to Peer-to- From the Editor’s Desk, by Mirjam Kühne Peer and Bandwidth Management .............. 1 Set against the beautiful backdrop of a golf resort near Dublin, IETF 72 offered an opportunity to revisit many of the same themes discussed at prior meetings. Message from the IETF Chair ........... 2 IPv6 was, once again, a hot topic, most notably dur- ing the Wednesday plenary, for which the Internet New BoF Meetings .... 2 Architecture Board organized a panel to discuss IPv6. Words from Panelists consisted of a number of IPv6 operators and the IAB Chair ............. 3 experts, each of whom described their experiences de- IETF 72 ploying IPv6 within their networks and organizations. Facts and Figures ...... 3 The panel discussion, moderated by Gregory Lebovitz, Plenary Report .......... 5 is described in detail on page 17. Real-Time Text .........9 In this issue, Shane Kerr takes a look at the IETF response to the DNS vulnerability that was discovered Citywest Hotel Convention Centre Talking with Jorge L. by Dan Kaminsky and that is often referred to as the near Dublin, site of IETF 72. Contreras ...............11 Kaminsky Attack (see page 31). While the discussions The Internet and within the IETF took place primarily within working groups, Shane offers a good look at the history Bandwidth-Intensive of DNS security and a brief review of recent DNS security work as well as a compilation of IETF Activities ................13 responses.
    [Show full text]
  • Project Maelstrom: Forensic Analysis of the Bittorrent-Powered Browser
    PROJECT MAELSTROM: FORENSIC ANALYSIS OF THE BITTORRENT-POWERED BROWSER Jason Farina, M-Tahar Kechadi, Mark Scanlon School of Computer Science, University College Dublin, Ireland. [email protected], {tahar.kechadi, mark.scanlon}@ucd.ie ABSTRACT In April 2015, BitTorrent Inc. released their distributed peer-to-peer powered browser, Project Maelstrom, into public beta. The browser facilitates a new alternative website distribution paradigm to the traditional HTTP-based, client-server model. This decentralised web is powered by each of the visitors accessing each Maelstrom hosted website. Each user shares their copy of the website;s source code and multimedia content with new visitors. As a result, a Maelstrom hosted website cannot be taken offline by law enforcement or any other parties. Due to this open distribution model, a number of interesting censorship, security and privacy considerations are raised. This paper explores the application, its protocol, sharing Maelstrom content and its new visitor powered “web-hosting” paradigm. Keywords: Project Maelstrom, BitTorrent, Decentralised Web, Alternative Web, Browser Forensics 1. INTRODUCTION • File Synchronisation Service – BitTorrent Sync is a cloudless alternative to the cloud-based, Project Maelstrom was released as a private alpha in multiple-device, file synchronisation services December 2014 [Klinker, 2014] and as a public beta such as Dropbox, OneDrive, iCloud, etc. [Scan- in April 2015 [Klinker, 2015]. Its purpose is to pro- lon et al., 2015]. With a standard BitTorrent vide a decentralised web ecosystem facilitating a new Sync install, users are not limited in the amount parallel to the existing world wide web. Through this of data they can share as there are no replicated decentralisation, users are free to create and share any server-side limitations.
    [Show full text]
  • Bittorrent: the Internet's 800-Pound Bandwidth Gorilla
    FTTH CONFERENCE BitTorrent: The Internet’s 800-Pound Bandwidth Gorilla ric Klinker, Chief Technology shut down a year later, the Officer of BitTorrent, emphasized Internet stops growing for Ethe changing shape of Internet four months. But innovation traffic – half of which is now peer-to- resumes, FastTrack peer-to- peer. Discussions with many in the au- peer protocols [used by Kazaa dience before his keynote suggested that and others] come on line in most believed peer-to-peer is being pri- 2001, and growth continues marily being used for illegal music and at the same rate as before.” video downloads – traffic that would “P2P is a technology, a dry up if strong digital rights manage- means to an end, separate ment took hold, leaving network opera- from the use,” he said. “Bit- tors with overcapacity. Torrent is a protocol, one But Klinker said the traffic would that allows it to be applied always be there, and would continue to to many applications. A re- grow. “We have over 55 major studios placement for “client-server” under license – over 10,000 titles, mov- architectures of the 1990s, ies, games, music,” he said. its roots go back to origins History bears him out. “Napster went of the Internet, which was beta in the summer of 1999. When the a peer-to-peer system when preliminary injunction to shut down it was designed. Each user’s happened, usage exploded as people tried server had equal status. to get as much as they could. When it did DNS and Usenet are P2P Eric Klinker, CTO of BitTorrent.
    [Show full text]
  • Illinois Opens Research Center in Singapore ECE Professor Ben Wah Named Director
    NEWS FOR ECE ILLINOIS ALUMNI AND FRIENDS SUMMER 2009 Illinois opens research center in Singapore ECE Professor Ben Wah named director Also in this issue: Planning for a new ECE building Let the computer look at your face and tell your age Jain elected to National Academy of Engineering Symposium celebrates Holonyak’s 80th birthday Department of Electrical and Computer Engineering Advocate for Electrical and Computer Engineering To alumni and friends of ECE ILLINOIS, This is my first opportunity to write to you as interim department head for ECE ILLINOIS. In assuming this role it is a privilege to follow my colleague Richard Blahut, a visionary leader whose inspirational service has enhanced our department’s international visibility and elevated its stature as a leading department in engineering education and foundational research. ECE ILLINOIS established its fame through engineering innovations of transformational societal impact by both its faculty and its alumni. These innovations led to new technologies that have fueled new economies and improved our quality of life. This tradition of excellence in engineering research and education continues vigorously today. I can think of only a handful of places in the world where so much talent is gathered together to generate new knowledge, inspire new ideas, and engage young minds in the excitement of service through innovation and entrepreneurship. And it is new knowledge that we must turn to now to combat the anxiety and sense of insecurity driven by the current global economic uncertainty. To borrow from Kurt Vonnegut, “new knowledge is the most valuable commodity on earth. The more truth we have to work with, the richer we become.” Generating and disseminating new knowledge is what ECE ILLINOIS does best.
    [Show full text]
  • Fibertoday.Com Vol
    fibertoday.com Vol. 10, No. 147 August 20, 2007 Dear Executive: The struggle between those who are building an aggressive fiber-centric network in the United States and those who are not really boils down to which carriers are putting their citizens and communities first and which are making their own interests primary. While we believe there are compelling economic arguments for going to FTTH in numerous instances, the fact of the matter is that somewhere in their thinking communities and carriers that do decide to bring fiber to their homes and multi-dwelling units are putting the people that they serve first, and those that do not are not. You can argue all you want that Verizon is out for its own economic ends, but the carrier through its FTTP program has ratcheted up the broadband in the United States and created a reason for going to the fiber solution. That thinking at least in part is being driven by the benefits derived by citizens fortunate enough to get it. It also has been tremendously heartening to see smaller carriers such as SureWest, jurisdictions including Lafayette, La., and real estate developments going to fiber. Certainly in each instance they have seen some benefit for themselves. But they also have seen the advantages to those they serve. Those espousing a national broadband policy look to the changing economic conditions that have seen hundreds of thousands of American jobs migrate overseas. Even as new jobs are created as the result of the broadband revolution, they very well may end up in India or The Philippines.
    [Show full text]
  • Bittorrent Embarks on Web Browser Project Maelstrom 11 December 2014, by Nancy Owano
    BitTorrent embarks on web browser Project Maelstrom 11 December 2014, by Nancy Owano "Distributed technology is perfect for this, as it requires the crowd to work together to host content so no individual or entity can take control of the web," said Owen Williams. According to the BitTorrent blog, the project team has in mind "Truly an Internet powered by people, one that lowers barriers and denies gatekeepers their grip on our future." Janko Roettgers of Gigaom said that "Project Maelstrom will serve up web pages directly from its users' computers, much in the same way that BitTorrent's file sharing technology distributes files without the need for a central server." On a mission to make the Internet more open, a Nathan Ingraham in The Verge explained how this BitTorrent browser, "Project Maelstrom," is in invite- would work: "In this vision, web publishers could only alpha. The BitTorrent blog on Wednesday publish, distribute, and update an entire website posted "an invite-only Alpha to help build the through the BitTorrent protocol, and others visiting distributed web." This is to be a browser designed the page would automatically help share the site's to power a way for web content to be published, content, just as anyone downloading a file over accessed and consumed. BitTorrent, the company BitTorrent would also start sharing the file with based in San Francisco, carries a forceful mission other peers." Ingraham quoted CEO Klinker statement, "to build a better Internet. To work with discussing the value of this move:"There'd be fewer people, industries and nations to create better centralized servers to get in the way of you and ways to move information.
    [Show full text]
  • Letter from Mary K. Engle, Associate
    UNITED STATES OF AMERICA FEDERAL TRADE COMMISSION WASHINGTON, D.C 20580 Division of Advertising Practices December 10, 2009 Eric Klinker, CEO BitTorrent, Inc. 201 Mission, 9th Floor San Francisco, CA 94105 Re: Inadvertent Sharing Protection Working Group Voluntary Best Practices Compliance Dear Mr. Klinker: In July 2008, numerous distributors of peer-to-peer file-sharing applications, including BitTorrent, agreed to abide by a set of guidelines (hereafter "Voluntary Best Practices"), created by the Distributed Computing Industry Association, to minimize the inadvertent sharing of sensitive files over peer-to-peer networks. The staff of the U.S. Federal Trade Commission's Division of Advertising Practices has recently reviewed uTorrent (version 1.8.4 build 16150), to determine if it complies with the Voluntary Best Practices. This letter sets forth the results of that review. We recognize that the uTorrent software application operates differently than some other peer-to-peer file-sharing applications in that it operates on the BitTorrent protocol (as opposed to the Gnutella protocol), allowing users to download portions of a file simultaneously from multiple users through the use of small files, called torrents. These torrent files contain information about the piece of media that a user wishes to share; however, they do not contain the media itself. Users must take the affirmative step of creating a torrent file and then "seed" it to a network to be shared. When another user downloads and opens the torrent file using a BitTorrent client, a connection is then made between the seeder's computer and that downloader's computer, allowing the file to be shared.
    [Show full text]
  • Paul Alexander Aitken Submitted in Accordance with the Requirements
    THE AMBIVALENCES OF PIRACY: BITTORRENT MEDIA PIRACY AND ANTI-CAPITALISM Paul Alexander Aitken Submitted in accordance with the requirements for the degree of Doctor of Philosophy The University of Leeds Institute of Communications Studies March 2012 \I INTELLECTUAL PROPERTY AND PUBLICATION STATEMENTS The candidate confirms that the work submitted is his own and that appropriate credit has been given where reference has been made to the work of others. This copy is supplied on the understanding that it is copyright material and that no quotation from the thesis may be published without proper acknowledgement. © 2012 The University of Leeds and Paul Alexander Aitken III ACKNOWLEDGEMENTS For my family. My parents, June and David Aitken, whose love and supported have made it all possible; my sister, Susan Aitken, whose generosity and support I couldn't have done without; my wee Gran, who sadly never got to see me finish. I can never thank any of you enough. This would never have been possible without your all. I am incredibly lucky to have you as my foundation. For Valerie Savard. Thank you for helping me when I was down and celebrating with me when I was up. Thank you for your intellectual sparring, for your challenges to my thought. Thank you for your patience. For Basil Chiasson. who over the years has become a brother. Thank you for the long chats, the late nights, the laughing, the intellectual stimulation and challenge. your generosity of spirit, the rock'n'roll ... for the friendship. For Joanna Redden. whose razor sharp wit and stunning intellect never fail to delight and amaze.
    [Show full text]