Filesharing Über P2P-Netzwerke

Total Page:16

File Type:pdf, Size:1020Kb

Filesharing Über P2P-Netzwerke Filesharing über P2P-Netzwerke 27. Mai 2008 Felix Jauch, Matthias Kasper, Adrian Waeber, Daniel Waltisberg fjauchf, mkasper, awaeber, [email protected] Supervisor: Dr. Rainer Baumann Abstract Mittels P2P-Netzwerken können Dateien direkt zwischen Internetbenutzern ausge- tauscht werden. Die Anfänge des Filesharings über P2P-Netzwerke liegen bei Naps- ter im Jahr 1999. Danach entwickelte eine immer grösser werdende Community viele verschiedene Netzwerke und Clients, bis zu den heutzutage populärsten Netzwerken eDonkey und BitTorrent. Technisch gesehen waren die ersten Netzwerke serverbasiert und erst später entwickelten sich parallel dazu dezentrale, serverlose Netzwerke. Die Benutzung von Filesharing-Programmen ist in der Gesellschaft weit verbreitet, beson- ders junge Männer sind dabei involviert. Da grosse Datenmengen über P2P-Netzwerke übertragen werden, wird die Internetinfrastruktur stark beansprucht und verursacht dadurch den Providern hohe Kosten. Für die Musik- und Filmindustrie stellt vor al- lem die freie Verfügbarkeit von urheberrechtlich geschützten Medien eine Gefahr für ihr Geschäftsmodell dar. Allerdings ist es in der Schweiz nach aktueller sowie ab 1. Juli 2008 neu geltender Gesetzesgrundlage rechtmässig, urheberrechtlich geschützte Film- und Musikdateien herunterzuladen, unter der Vorraussetzung, dass kein gleichzeitiges Anbieten stattfindet. Im Unterschied dazu ist es in den USA generell verboten, urhe- berrechtlich geschützte Werke über P2P-Netzwerke, sei es durch Up- oder Download, zu übermitteln. Inhaltsverzeichnis 1. Einleitung7 1.1. Motivation....................................7 1.2. Einordnung...................................7 1.3. Einführung....................................8 1.4. Struktur der Arbeit...............................9 2. Entstehung und Verbreitung 10 2.1. Ursprünge von P2P............................... 10 2.1.1. ARPAnet................................. 10 2.1.2. Usenet.................................. 11 2.2. Ursprünge von Filesharing.......................... 11 2.2.1. FTP-Server................................ 11 2.2.2. Websites................................. 12 2.2.3. Instant Messenger........................... 12 2.3. P2P-Filesharing-Clients und -Protokolle im Laufe der Zeit........ 13 2.3.1. Napster................................. 13 2.3.2. Audiogalaxy............................... 16 2.3.3. OpenNap................................ 18 2.3.4. Gnutella................................. 20 2.3.5. FastTrack................................. 22 2.3.6. eDonkey................................. 27 2.3.7. BitTorrent................................ 29 2.3.8. Andere Netzwerke und Clients.................... 31 2.4. Fazit und Ausblick............................... 32 3. Technischer Hintergrund 33 3.1. Das Gnutella-Netzwerk............................ 34 3.1.1. Die erste Verbindung.......................... 35 3.1.2. Verbindungsaufbau.......................... 35 3.1.3. Nachrichten............................... 36 3.1.4. Routing Regeln............................. 38 3.1.5. Bootstrapping.............................. 38 3.1.6. Die Suche nach Dateien........................ 39 3.1.7. Download................................ 39 3.1.8. Firewall................................. 40 3.1.9. Verbesserungen und Probleme in der Version 0.4.......... 40 3 Inhaltsverzeichnis 3.1.10. Veränderungen in der Version 0.6.................. 41 3.1.11. Gnutella2................................ 42 3.2. Das BitTorrent-Netzwerk............................ 44 3.2.1. Begriffserklärungen.......................... 44 3.2.2. Funktionsweise............................. 45 3.2.3. Auswahl des nächsten Stückes der Datei.............. 48 3.2.4. Choking................................. 49 3.2.5. Ausblick................................. 51 3.3. Das FastTrack-Netzwerk............................ 52 3.3.1. Struktur................................. 52 3.3.2. Funktionsweise............................. 52 3.3.3. UUHash................................. 53 3.4. Das eDonkey-Netzwerk............................ 53 3.4.1. Struktur................................. 53 3.4.2. eD2K-Links............................... 54 3.4.3. Low und High ID............................ 55 3.4.4. Kommunikation zwischen Client und Server............ 55 3.4.5. Download................................ 56 3.4.6. Probleme................................. 57 3.5. Das Kademlia-Netzwerk........................... 57 3.5.1. Struktur................................. 57 3.5.2. Dateien zur Verfügung stellen.................... 58 3.5.3. Suche nach Dateien mittels Hash................... 59 3.5.4. Suche nach Dateien mittels Schlüsselwort.............. 59 3.5.5. Vorteile und Probleme......................... 60 3.6. Fazit........................................ 60 4. Aktuelle P2P-Filesharing-Clients 63 4.1. Verbreitung der Protokolle und Clients.................... 63 4.1.1. Verbreitung der Protokolle nach Datenvolumen.......... 63 4.1.2. Verbreitung nach Anzahl installierter Clients............ 64 4.2. Aktuelle Clients im Vergleich......................... 66 4.2.1. LimeWire und FrostWire........................ 67 4.2.2. eMule.................................. 73 4.2.3. µTorrent................................. 81 4.2.4. Azureus (Vuze)............................. 85 4.2.5. Shareaza................................. 91 4.3. Fazit........................................ 96 5. Gesellschaft und Wirtschaft 98 5.1. Filesharing in der Gesellschaft......................... 98 5.1.1. Der «typische» Filesharer....................... 98 5.1.2. Technische Gegebenheiten....................... 100 5.1.3. Erfahrung mit Clients......................... 101 4 Inhaltsverzeichnis 5.1.4. Downloadinhalte und Bereitstellung von Dateien......... 103 5.1.5. Onlinekauf von Musik und Auswirkungen auf das Kaufverhalten 105 5.1.6. Rechtliche Einschätzung der Teilnehmer.............. 106 5.1.7. Gründe gegen Filesharing über P2P-Netzwerke.......... 107 5.2. Inhalte von P2P-Filesharing-Netzwerken.................. 108 5.3. Auswirkungen auf die Internetinfrastruktur................ 110 5.4. Auswirkungen auf die Musik-, Film- und Softwareindustrie....... 112 5.4.1. Die Musikindustrie........................... 112 5.4.2. Die Filmindustrie............................ 116 5.4.3. Die Softwareindustrie......................... 121 5.5. Einstellung der Künstler gegenüber Filesharing.............. 122 5.5.1. Vorreiter «Radiohead»......................... 123 5.5.2. Filesharing - das neue Radio?..................... 124 5.5.3. Regisseure und ihre Filme....................... 125 5.5.4. Autoren................................. 126 5.5.5. Interview mit DJ Novus von Groove Coverage........... 127 5.6. Fazit und Ausblick............................... 131 6. Rechtliche Situation 133 6.1. Beteiligte Parteien................................ 133 6.2. Aktuelle Rechtslage in der Schweiz...................... 134 6.2.1. Anwendbare Strafbestimmungen des Bundesgesetzes über das Urheberrecht und verwandte Schutzrechte............. 134 6.2.2. Musik-, Film- und Computerprogrammdateien als Werke im Sin- ne des Urheberrechtsgesetzes..................... 135 6.2.3. Upload von Musik-, Film- oder Computerprogrammdateien... 136 6.2.4. Download von Musik-, Film- oder Computerprogrammdateien. 141 6.2.5. Entwicklung und Vertrieb von P2P-Filesharing-Software..... 145 6.2.6. Betreiben von Webverzeichnissen mit Hash-Links auf urheber- rechtlich geschützte Dateien in einem P2P-Filesharing-Netzwerk 147 6.2.7. Ermittlung der Täter und Auskunftspflicht der Internet Service Provider................................. 152 6.2.8. Vergangene und aktuelle Rechtsfälle................. 153 6.3. Neue Rechtslage in der Schweiz ab 1. Juli 2008............... 156 6.3.1. Änderung des Bundesgesetzes über das Urheberrecht und ver- wandte Schutzrechte vom 5. Oktober 2007............. 157 6.3.2. Auswirkungen auf den Up- und Download von Musik-, Film- oder Computerprogrammdateien.................. 159 6.4. Rechtslage in den USA............................. 160 6.4.1. Das Copyright - Urheberrechtlicher Schutz in den USA...... 160 6.4.2. Urheberrechtsverletzungen und Haftungsfragen in P2P-Filesha- ring-Netzwerken............................ 165 6.5. Vergleich der beiden Rechtslagen....................... 181 6.6. Fazit und Ausblick............................... 182 5 Inhaltsverzeichnis 7. Schlusswort 184 A. Umfrage 185 A.1. Artikel auf PCtipp.ch.............................. 185 A.2. Auswertung der Umfrage........................... 186 A.3. Rohdaten der Umfrage............................. 198 A.3.1. Korrelationen.............................. 202 B. Abbildungsverzeichnis 205 C. Tabellenverzeichnis 207 D. Literaturverzeichnis 208 6 1. Einleitung 1.1. Motivation Wir, vier ETH-Studenten des sechsten Semesters, gehören wahrscheinlich zur ersten Generation, die mit dem Internet gross geworden ist und die den Umgang mit Compu- tern schon von klein auf lernte. So entwickelte sich bei uns allen ein starkes Interesse für aktuelle Technik und die vielen Verwendungsmöglichkeiten des Internets. Besonders fasziniert waren wir von der Thematik «Filesharing über Peer-to-Peer-Netzwerke». Der Gedanke, dass man durch diese Technologie jedem Menschen auf der Welt seine Datei- en zur Verfügung stellen und Teil eines weltweiten Netzwerks werden kann, begeister- te uns seit der Geburtsstunde des ersten Filesharing-Programms. Interessiert verfolgten wir die Entwicklungen angefangen bei Napster bis hin zum heute populärsten Netz- werk BitTorrent. Als sich nun in
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Confidential Data-Outsourcing And
    Konrad Jünemann Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems Confidential Data-Outsourcing and Self-Optimizing P2P-Networks Konrad Jünemann Konrad Jünemann Confidential Data-Outsourcing and Self- Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems Confidential Data-Outsourcing and Self- Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems by Konrad Jünemann Dissertation, Karlsruher Institut für Technologie (KIT) Fakultät für Informatik, 2014 Tag der mündlichen Prüfung: 01. Dezember 2014 Referenten: Prof. Dr. rer. nat. Hannes Hartenstein Prof. Dr. rer. nat. Ralf Reussner Impressum Karlsruher Institut für Technologie (KIT) KIT Scientific Publishing Straße am Forum 2 D-76131 Karlsruhe KIT Scientific Publishing is a registered trademark of Karlsruhe Institute of Technology. Reprint using the book cover is not allowed. www.ksp.kit.edu This document – excluding the cover – is licensed under the Creative Commons Attribution-Share Alike 3.0 DE License (CC BY-SA 3.0 DE): http://creativecommons.org/licenses/by-sa/3.0/de/ The cover page is licensed under the Creative Commons Attribution-No Derivatives 3.0 DE License (CC BY-ND 3.0 DE): http://creativecommons.org/licenses/by-nd/3.0/de/ Print on Demand 2015 ISBN 978-3-7315-0328-6 DOI 10.5445/KSP/1000045068 Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems zur Erlangung des akademischen Grades eines Doktors der Ingenieurwissenschaften von der Fakultat¨ fur¨ Informatik des Karlsruher Instituts fur¨ Technologie (KIT) genehmigte Dissertation von Konrad Junemann¨ aus Wilhelmshaven Tag der mundlichen¨ Prufung:¨ 01.
    [Show full text]
  • Software to Download from File Sharing Sites 10 Best File Sharing Software for Peer to Peer File Sharing
    software to download from file sharing sites 10 Best File Sharing Software for Peer to Peer File Sharing. Sharing files online isn’t that much easy as it should be, especially, if you have large files with size in GBs. Thankfully, we can use P2P (peer-to- peer) file sharing software to easily share files with anyone online of no matter what size. You can easily upload or download TBs of data without any restrictions. P2P file sharing software can be quite handy, but at the same time, they also have some negative points. These p2p file sharing software also host illegal downloads so that it may lead to any action against you. Furthermore, these peer to peer file sharing software are also known to spread viruses and malware; you will have to be careful about downloading too. Top 10 Best File Sharing Software for Peer to Peer File Sharing. There are dozens of P2P file sharing software to choose from, but it is essential to choose the best P2P file sharing software that is safe and features rich. To help you find the best file sharing software for your needs, we have compiled a list of best file sharing software. You can just select the one that seems right for your needs. 1. uTorrent. Even after being acquired by BitTorrent.inc and becoming closed-sourced with ads, uTorrent is still the leader when it comes to P2P file sharing software. Although you need to subscribe for a premium membership to take full advantage of the client, even its free version offers all the required features to upload and download files without limitations.
    [Show full text]
  • Groundbreaking Ceremony Held for New ECE Building by TOM MOONE
    NEWS FOR ECE ILLINOIS ALUMNI AND FRIENDS WINTER 2011 Also in this issue: New Assured Cloud Computing Center to be established at Illinois Groundbreaking Solar Decathlon: Helping students and the world ceremony held Alumnus Michael McCorquodale is the first ECE Engineer for new ECE building in Residence Department of Electrical and Computer Engineering Breaking ground on the future Dear alumni and friends, I have good news! The dream of a new building for our department, after many years of planning and anticipation, is now becoming a reality. Last month’s groundbreaking of the new ECE building marks the beginning of a new era for our department, a department of global influence and impact, thanks to the excellence of its faculty and alumni. And it is this global impact that makes this groundbreaking special not only for our department, our college, our campus, and our university, but also for the state of Illinois, our nation, and the world. Our faculty and our alumni have been among the pioneers of the major technological innovations that are the bedrock of today’s computing and communication technologies. The marvel of the computing technology and the communications infrastructure we enjoy today, and its catalytic role in improving living standards around the globe, would not have been possible without John Bardeen’s invention of the transistor or Jack Kilby’s brilliant idea of the integrated circuit. These Nobel Prize-winning innovations by two giants of the ECE ILLINOIS community have been followed by many more groundbreaking advances by ECE faculty and alumni, advances that inspire and drive our quest for a sustainable future for all.
    [Show full text]
  • Smart Regulation in the Age of Disruptive Technologies
    SMART REGULATION IN THE AGE OF DISRUPTIVE TECHNOLOGIES Andrea Renda CEPS, Duke, College of Europe 13 March 2018 A New Wave of Regulatory Governance? • First wave: structural reforms (1970s-1980s) • Privatizations, liberalizations • Second wave: regulatory reform (1980s-1990s) • Ex ante filters + “Less is more” • Third wave: regulatory governance/management (2000s) • Policy cycle concept + importance of oversight • Better is more? Alternatives to regulation, nudges, etc. • Fourth wave: coping with disruptive technologies? (2010s) Competition Collusion Access Discrimination Digital Technology as “enabler” Jobs Unemployment Enforcement Infringement Key emerging challenges • From national/EU to global governance • From ex post to ex ante/continuous market monitoring (a new approach to the regulatory governance cycle) • Need for new forms of structured scientific input (a new approach to the innovation principle, and to innovation deals) • From regulation “of” technology to regulation “by” technology • A whole new set of alternative policy options • Away from neoclassical economic analysis, towards multi-criteria analysis and enhance risk assessment/management/evaluation Alternative options & Problem definition Regulatory cycle Impact Analysis Risk assessment, Risk management Evaluation dose-response Emerging, disruptive Policy strategy and Learning technology experimentation • Scientific input and forecast • Mission-oriented options • Ongoing evaluation • Mission-led assessment • Pilots, sprints, sandboxes, tech- • Pathway updates • Long-term
    [Show full text]
  • Operation D-Elite Results in Jail Time for Bittorrent Admin by Jessie B
    Operation D-Elite Results in Jail Time for BitTorrent Admin By Jessie B. Sweetland Daniel Dove, an administrator of EliteTorrent.org, a peer-to-peer (P2P) BitTorrent site was convicted on July 28, 2008 of one count each of conspiracy and copyright infringement for his involvement with the site. On September 9, 2008 Dove was sentenced to a term of 18 months of incarceration and a $20,000 fine. The FBI and the U.S. Immigration and Customs Enforcement (ICE) shut the site down on May 25, 2005 as part of Operation D-Elite. Agents of the FBI and ICE targeted EliteTorrent primarily for its illegal distribution of copyrighted movies. The Department of Justice reported that the site had a copy of Star Wars Episode III: Revenge of the Sith available for download six hours before it was shown in theatres. Users downloaded the movie 10,000 times within the following 24 hours. At its peak the site had over 125,000 users that downloaded approximately 700 movie titles over 1.1 million times. Several other BitTorrent sites have shut down in recent years, including LokiTorrent and SuprNova.org due to threats of legal action or a legal shut down. Shutting down BitTorrent sites does little to deter users of P2P networks. As quickly as one site shuts down users move to other sites, many of which are hosted outside of the United State and therefore are harder for the United States government to control. Dove’s conviction follows the convictions of several other administrators’ for the P2P network, including Grant Stanley and Scott McCausland who each received five months incarceration, followed by five months home confinement and a $3,000 fine.
    [Show full text]
  • A Dissertation Submitted to the Faculty of The
    A Framework for Application Specific Knowledge Engines Item Type text; Electronic Dissertation Authors Lai, Guanpi Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 25/09/2021 03:58:57 Link to Item http://hdl.handle.net/10150/204290 A FRAMEWORK FOR APPLICATION SPECIFIC KNOWLEDGE ENGINES by Guanpi Lai _____________________ A Dissertation Submitted to the Faculty of the DEPARTMENT OF SYSTEMS AND INDUSTRIAL ENGINEERING In Partial Fulfillment of the Requirements For the Degree of DOCTOR OF PHILOSOPHY In the Graduate College THE UNIVERSITY OF ARIZONA 2010 2 THE UNIVERSITY OF ARIZONA GRADUATE COLLEGE As members of the Dissertation Committee, we certify that we have read the dissertation prepared by Guanpi Lai entitled A Framework for Application Specific Knowledge Engines and recommend that it be accepted as fulfilling the dissertation requirement for the Degree of Doctor of Philosophy _______________________________________________________________________ Date: 4/28/2010 Fei-Yue Wang _______________________________________________________________________ Date: 4/28/2010 Ferenc Szidarovszky _______________________________________________________________________ Date: 4/28/2010 Jian Liu Final approval and acceptance of this dissertation is contingent
    [Show full text]
  • Gnutella Etc
    Uni Innsbruck Informatik - 1 Peer-to-Peer Systems Unstructured P2P File Sharing Systems Michael Welzl [email protected] DPS NSG Team http://dps.uibk.ac.at/nsg Institute of Computer Science University of Innsbruck, Austria Uni Innsbruck Informatik - 2 Unstructured vs. Structured P2P systems • Terms refer to information management: where are objects placed, how are they found? – Distributed “randomly“ across the network, with several replicas – Content source stays where it is – Structured P2P systems: rules bind content to (typically hash) keys, which are used as addresses (“document routing model“) • Systems like Napster, Gnutella etc. are unstructured • Three common models: – Centralized (also: “central server model“); e.g. Napster, BitTorrent –Pure; e.g. Gnutella 0.4, Freenet “flooded request model“ –Hybrid; e.g. Gnutella 0.6, Kazaa, JXTA Uni Innsbruck Informatik - 3 Development of P2P Applications 100% Freenet Direct Connect++ Shoutcast Carracho 90% Blubster Neo-M odus 80% FastTrack WinM X FastTrack Shoutcast 70% Audiogalaxy eDonkey2000 Hotline 60% Gnutella BitTorrent 50% 40% 30% datavolumes in per week % 20% edonkey BitTorrent Gnutella 10% 0% 18.02.2002 18.05.2002 18.08.2002 18.11.2002 18.02.2003 18.05.2003 18.08.2003 18.11.2003 18.02.2004 18.05.2004 18.08.2004 Data source: http://netflow.internet2.edu/weekly/ Traffic portions of the different P2P applications and protocols from the traffic measured per week in the Abilene backbone from 18.02.2002 until 18.010.2004 Uni Innsbruck Informatik - 4 Development of P2P applications
    [Show full text]
  • Coopviz: Real Time Visualization of Bittorrent Swarm Dynamics
    CoopViz: Real Time Visualization of BitTorrent Swarm Dynamics Stefano Barbieri CoopViz: Real Time Visualization of BitTorrent Swarm Dynamics Master’s Thesis in Computer Engineering Parallel and Distributed Systems group Faculty of Electrical Engineering, Mathematics, and Computer Science Delft University of Technology Stefano Barbieri 3rd September 2009 Author Stefano Barbieri 1397052 [email protected] Title CoopViz: Real Time Visualization of BitTorrent Swarm Dynamics MSc presentation September 09, 2009 Graduation Committee dr. ir. D.H.J. Epema (chair) Faculty EEMCS, Delft University of Technology dr. ir. J. Pouwelse (University Supervisor) Faculty EEMCS, Delft University of Technology dr. ir. G. Gaydadjiev (Committee Member:) Faculty EEMCS, Delft University of Technology Abstract Peer to peer networks are only successful when a significant amount of users is willing to share their resources. In order to have highly efficient file sharing sys- tems, each user should upload to the other peers a number of bytes at least equal to the number of bytes he has downloaded from the community. Unfortunately many users show a selfish behavior, refusing to offer their upload bandwidth to other peers, thus limiting the efficiency of the networks. P2P clients implement different mechanisms in order to mitigate this misbehavior and improve cooperation; often, though, these policies are not enough to enforce altruism in peer-to-peer communi- ties. This thesis explores a new mean to stimulate users to give their fair contribu- tion to the P2P community; the final scope is to generate an emergent self-policing system where users take active part in determining the bandwidth allocation poli- cies. This is achieved by means of a graphical interface, CoopViz, that provides users with up-to-date insights into cooperative behavior of peers and allows the latter to vote on each other, showing their appreciation or disapproval.
    [Show full text]
  • Protection and Restriction to the Internet
    Protection and restriction to the internet Dear wireless users, To allow all our users to enjoy quality browsing experience, our firewall has been configured to filter websites/applications to safeguards the interests of our student community in ensuring uninterrupted access to the Internet for academic purposes. In the process of doing this, the firewall will block access to the applications listed in the table below during peak hours ( Weekdays: 8:30am to 5pm ) which: o may potentially pose security hazards o result in excessive use of bandwidth, thereby reducing access to online and educational resources by the larger student community o could potentially result in violation of Malaysian Laws relating to improper and illegal use of the Internet Nevertheless, you may access the restricted websites/applications if they do not potentially pose any security hazards or violation of Malaysian law from our lab computers during our operation hours (Weekdays: 8:30am – 9:30pm) or you may access via the wireless@ucti or wireless@APU network from your mobile devices after the peak hours. Internet services provided by the University should mainly be used for collaborative, educational and research purposes in support of academic activities carried out by students and staff. However, if there are certain web services which are essential to students' learning, please approach Technology Services to discuss how access could be granted by emailing to [email protected] from your university email with the following details: • Restricted website/application
    [Show full text]
  • Exinda Applications List
    Application List Exinda ExOS Version 6.4 © 2014 Exinda Networks, Inc. 2 Copyright © 2014 Exinda Networks, Inc. All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. Document Built on Tuesday, October 14, 2014 at 5:10 PM Documentation conventions n bold - Interface element such as buttons or menus. For example: Select the Enable checkbox. n italics - Reference to other documents. For example: Refer to the Exinda Application List. n > - Separates navigation elements. For example: Select File > Save. n monospace text - Command line text. n <variable> - Command line arguments. n [x] - An optional CLI keyword or argument. n {x} - A required CLI element. n | - Separates choices within an optional or required element. © 2014 Exinda Networks, Inc.
    [Show full text]
  • P2P and Bittorrent
    inf5040 - Presentation by group 1 nghial, baardehe, chricar 30.10.08 Goals of today After this lecture you should have a general understanding of what P2P and bittorrent is be able to recognize the main differences of bitTorrent and other P2P networks A way of organizing resource sharing in computer networks What is P2P? Server/client model Peer-to-peer model Characteristics of P2P networks Peers act as equals Peers function as both client and server No central server managing the network No central router Examples of ”pure” P2P networks Gnutella, Freenet (filesharing) In short Decentralization and multirole BUT! Most networks and applications described as P2P actually contain or rely on some non-peer elements History 1970 – SMTP, NNTP (Usenet) One process both server and client IBM, 1984 ”Advanced Peer to Peer Networking” Software for filesharing in a LAN 1990 – IRC (DCC), MBONE One client can both send and receive 1997 – Napster Created a lot of controversy Convicted because of the centralized file indexing Advantages of P2P networks Better performance and reliability compared to server/client scheme Popular resources will be available at several locations Principle of locality -> less delay and faster transmission Overlay routing Application layer routing (middleware) Two ways of searching for files Flooding DHT (Distributed Hash Table) Area of application Mostly used in ad hoc networks Often categorized by what it’s used for Filesharing Media streaming Telephony (skype) Discussion forums Used to distribute
    [Show full text]