A Survey of P2P Traffic Management Approaches: Best Practices and Future Directions

Total Page:16

File Type:pdf, Size:1020Kb

A Survey of P2P Traffic Management Approaches: Best Practices and Future Directions 318 JOURNAL OF INTERNET ENGINEERING, VOL. 5, NO. 1, JUNE 2012 A Survey of P2P Traffic Management Approaches: Best Practices and Future Directions R. Dunaytsev, D. Moltchanov, Y. Koucheryavy, O. Strandberg, and H. Flinck situation has changed dramatically in recent years with the Abstract—Over the last decade, we have witnessed the increasing deployment of multimedia applications and tremendous growth of peer-to-peer (P2P) file sharing traffic. services such as Flash video, IPTV, online games, etc. In Built as overlays on top of the existing Internet infrastructure, 2010, global Internet video traffic has surpassed global P2P P2P applications have little or no knowledge of the underlying network topology, generating huge amounts of “unwanted” traffic [6]. According to recent studies [6] [7] [8], P2P traffic inter-domain traffic. Bandwidth-hungry P2P applications can is growing in volume, but declining as a percentage of overall easily overload inter-domain links, disrupting the performance Internet traffic. However, the prevalence of real-time of other applications using the same network resources. This entertainment traffic (Flash, YouTube, Netflix, Hulu, etc.) forces Internet service providers (ISPs) either to continuously with a decrease in the fraction of P2P file sharing traffic is invest in infrastructure upgrades in order to support the quality usually the result of cheap and fast Internet access and is of service (QoS) expected by customers or use special techniques when handling P2P traffic. In this paper, we discuss more typical for mature broadband markets, while many the best practices and approaches developed so far to deal with emerging broadband markets are still in a phase in which P2P P2P file sharing traffic, identifying those that may provide file sharing accounts for a large (or even a dominant) portion long-term benefits for both ISPs and users. of global traffic [8]. In any case, P2P file sharing is still fairly popular among users and continues to be one of the biggest Index Terms—File sharing, peer-to-peer, quality of service, consumers of network resources. For instance, it is expected traffic management. that P2P file sharing traffic will reach 8 exabytes per month by 2015, at a compound annual growth rate (CAGR) of 15% from 2010 to 2015 [6]. I. INTRODUCTION From the early days of P2P file sharing systems, P2P For a long time, the reference model of data exchange in traffic and its impact on the performance of other the Internet was the client/server model, resulting in the applications running on the same network has attracted the so-called “downstream paradigm”, where the vast majority of attention of the academic community and Internet service data is being sent to the user with low traffic load in the providers (ISPs), and continues to be a hot research topic opposite direction. As a consequence, many communication (e.g., see [9] and references therein). What makes this type of technologies and networks have been designed and deployed traffic so special? Let us consider the most distinctive keeping this asymmetry in mind. The best-known examples features of P2P file sharing from the ISP’s point of view. are the Asymmetrical Digital Subscriber Line (ADSL) and 1) P2P file sharing applications are bandwidth-hungry: Data Over Cable Service Interface Specification (DOCSIS) Network applications (and hence traffic sources) can be technologies. For instance, ADSL2 and ADSL2+ provide a classified into 2 basic types: constant bit rate (CBR) and downstream rate of up to 24 Mbps and an upstream rate of up variable bit rate (VBR). CBR applications generate data to 1 Mbps [1]. In fact, bandwidth asymmetry with high data traffic at a constant rate and require a certain bandwidth rates in the downstream direction together with low-rate allocation in order to operate successfully and support the upstream links fits well the environment with dedicated desired quality of service (QoS). At the same time, allocating servers and conventional users. Everything changed with the bandwidth above the requirement does not improve the user arrival of Napster and other peer-to-peer (P2P) file sharing satisfaction. VBR applications generate data traffic at a systems in the late 1990’s and early 2000’s. In such systems, variable rate and are typically designed to quickly discover all participants (although to different extents) act as both and utilize the available bandwidth. In general, the more the content providers and content requestors, thus transmitting bandwidth, the better the user-perceived QoS. However, in and receiving approximately equal amounts of data. Hence, order to provide scalability to a large number of clients uplink and downlink data flows tend to be symmetric [2]. accessing the system simultaneously, both CBR and VBR Since then, P2P networks have experienced tremendous servers usually limit the maximum data rate per user. As a growth, and for several years P2P file sharing traffic used to result, this effectively places an upper bound on the amount be the dominant type of traffic in the Internet [3] [4] [5]. The of data that can be transmitted per unit time and thus the bandwidth used by an individual user. Manuscript received May 15, 2012. As reported in [7] [8] [10], BitTorrent is the most popular Roman Dunaytsev is with the Space Internetworking Center (SPICE), Electrical and Computer Engineering Department, Democritus University of P2P file sharing system today. In contrast to client/server Thrace, Greece (corresponding author’s phone: +30-6995119041; fax: systems, BitTorrent is more robust and scalable: as more +30-2541079554; e-mail: [email protected]). users interested in downloading the same content join an Dmitri Moltchanov and Yevgeni Koucheryavy are with the Department of overlay network, called a torrent or a swarm, the download Communications Engineering, Tampere University of Technology, Finland (e-mail: [email protected], [email protected]). rate that is achieved by all the peers increases [11]. With Ove Strandberg and Hannu Flinck are with Nokia Siemens Networks, BitTorrent, when multiple users are downloading the same Espoo, Finland (e-mail: [email protected], [email protected]). DUNAYTSEV et al.: A SURVEY OF P2P TRAFFIC MANAGEMENT APPROACHES: BEST PRACTICES AND FUTURE DIRECTIONS 319 file at the same time, they upload pieces of the file to each other. Instead of relying on a single server, this mechanism distributes the cost of storing and sharing large amounts of data across peers and allows combining upload capabilities of multiple peers into the compound download rate observed by a user [12]. As a rule, if there are enough active peers, the maximum achievable throughput of a user is mostly limited by either congestion somewhere in the ISP’s network (if any) or the last-mile bandwidth of the user. In well-provisioned networks, this results in higher data rates (e.g., up to 80 Mbps over a 100 Mbps Ethernet link) and potentially larger amounts of data that can be sent per unit time, when compared to traditional client/server applications and services such as the World Wide Web and IPTV. In addition, since P2P file sharing requires very little human intervention once it is initiated, some users tend to run P2P programs 24/7, generating huge amounts of traffic. High-speed P2P traffic interferes with other traffic on the same network, degrading the performance of delay-sensitive applications such as multimedia streaming, online games, and VoIP. Poor application performance during congestion Fig. 2. A user in Greece downloads the latest version of Ubuntu. Most of the causes low customer satisfaction and aggravates subscriber peers are from other countries and even the other side of the globe. Does it churn, leading to a decline in service revenues. In turn, this mean that no one is seeding this distro in Greece? Of course not! It is just a forces ISPs either to continuously invest in infrastructure consequence of the random peer selection. upgrades in order to support the QoS expected by customers or use special policies when handling P2P traffic. 3) P2P file sharing brings no additional profit to ISPs, 2) P2P file sharing applications are topology-unaware: only additional costs and legal headaches: Nowadays, some P2P file sharing applications establish overlays on top of the ISPs tend to charge content providers and content delivery Internet infrastructure with little or no knowledge of the networks (CDNs) additional fees for either carrying underlying network topology (see Fig. 1). In P2P networks, high-bandwidth content over their networks or providing data are often available in many equivalent replicas on QoS guarantees for premium traffic. Meanwhile, end users different hosts. However, the lack of topology information are typically billed for Internet access based on flat-rate leads P2P applications to make random choice of peers from pricing, so ISPs do not generate any additional revenue from a set of candidates. For example, it is common for a peer that delivering P2P traffic to/from their customers. wants to download some data (music, movies, software, etc.) High-speed P2P data transfers may also increase the cost to choose sources randomly, possibly picking one located on of traffic exchange with other ISPs. The vast majority of ISPs the other side of the world (see Fig. 2). Such random (except a small group of Tier 1 ISPs that rely completely on selection ignores many peers that are topologically closer and settlement-free peering) are charged for traffic transit therefore could provide better performance in terms of according to the 95th percentile billing model, which works throughput and latency. Moreover, this leads to inefficient as follows. Transit providers poll customer interface ports at utilization of network resources, significant amounts of regular intervals (typically, every 5 minutes) throughout the costly inter-ISP traffic, and congested inter-domain links billing cycle.
Recommended publications
  • Prebrane Zo Stranky
    Manuál pre začiatočníkov a používateľov Microsoft Windows Galadriel 1.7.4 Manuál je primárne tvorený pre Ubuntu 7.04 Feisty Fawn. Dá sa však použiť aj pre Kubuntu, Xubuntu, Edubuntu, Ubuntu Studio a neoficiálne distribúcie založené na Ubuntu. Pokryté verzie: 7.10, 7.04, 6.10, 6.06 a 5.10 (čiastočne) Vypracoval Stanislav Hoferek (ICQ# 258126362) s komunitou ľudí na stránkach: linuxos.sk kubuntu.sk ubuntu.wz.cz debian.nfo.sk root.cz 1 Začíname! 5 Pracovné prostredie 9 Live CD 1.1 Postup pre začiatočníkov 5.1 Programové vybavenie 9.1 Vysvetlenie 1.2 Zoznámenie s manuálom 5.1.1 Prvé kroky v Ubuntu 9.2 Prístup k internetu 1.3 Zoznámenie s Ubuntu 5.1.2 Základné programy 9.3 Pripojenie pevných diskov 1.3.1 Ubuntu, teší ma! 5.1.3 Prídavné programy 9.4 Výhody a nevýhody Live CD 1.3.2 Čo tu nájdem? 5.2 Nastavenie jazyka 9.5 Live CD v prostredí Windows 1.3.3 Root 5.3 Multimédia 9.6 Ad-Aware pod Live CD 1.4. Užitočné informácie 5.3.1 Audio a Video Strana 48 1.4.1 Odkazy 5.3.2 Úprava fotografii 1.4.2 Slovníček 5.4 Kancelária 10 FAQ 1.4.3 Ako Linux funguje? 5.4.1 OpenOffice.org 10 FAQ 1.4.4 Spúšťanie programov 5.4.2 PDF z obrázku Strana 50 1.5 Licencia 5.4.3 Ostatné Strana 2 5.5 Hry 11 Tipy a triky 5.6 Estetika 11.1 Všeobecné rady 2 Linux a Windows 5.7 Zavádzanie systému 11.2 Pokročilé prispôsobenie systému 2.1 Porovnanie OS 5.7.1 Zavádzač 11.3 Spustenie pri štarte 2.2 Náhrada Windows Programov 5.7.2 Prihlasovacie okno 11.4 ALT+F2 2.3 Formáty 5.7.3 Automatické prihlásenie 11.5 Windows XP plocha 2.4 Rozdiely v ovládaní 5.8 Napaľovanie v Linuxe Strana 55 2.5 Spustenie programov pre Windows 5.9 Klávesové skratky 2.6 Disky 5.10 Gconf-editor 12 Konfigurácia 2.7 Klávesnica Strana 27 12.1 Nástroje na úpravu konfigurákov Strana 12 12.2 Najdôležitejšie konf.
    [Show full text]
  • NET NEUTRALITY Work Operator
    Database NET NEUTRALITY work operator. In October 2007, Comcast was ac- cused of secretly deploying filtering technologies to manage its network in order to keep some peer-to- Net neutrality denotes the neutral transmission of peer traffic from overloading its network and hence data via the Internet, i.e., every packet of data, affecting the accessing speeds of its other Internet regardless of its content, origin and the application subscribers. The FCC deemed it unreasonable for that created it, is treated the same way and the best Comcast to discriminate against particular Internet effort should always be made to forward it.This con- applications and not to disclose its practice ade- cept is often regarded as a fundamental characteris- quately to its customers and therefore ruled against tic of the Internet. However, the amount of data that Comcast’s practices of throttling Internet traffic and is transported via the Internet is increasing rapidly, delaying peer-to-peer traffic. Comcast appealed to especially because of applications like music and vi- the US Court of Appeals, claiming that no legally deo downloads, Internet TV,and Internet telephony. enforceable standards or rules on the matter existed. All these applications require large capacities. This In April 2010 the federal appeals court ruled that the may lead to a capacity overload and delays of data FCC had limited power over Internet traffic under transmissions.The current technological state allows current law. This decision allows network operators for assigning different priorities to different data to block or slow specific sites and charge sites to packets. Therefore, the discussion has emerged deliver their content faster to users.
    [Show full text]
  • Vysoké Učení Technické V Brně Detekcia Seedboxov V Sieti Bittorrent
    VYSOKÉ UČENÍ TECHNICKÉ V BRNĚ BRNO UNIVERSITY OF TECHNOLOGY FAKULTA INFORMAČNÍCH TECHNOLOGIÍ FACULTY OF INFORMATION TECHNOLOGY ÚSTAV INFORMAČNÍCH SYSTÉMŮ DEPARTMENT OF INFORMATION SYSTEMS DETEKCIA SEEDBOXOV V SIETI BITTORRENT DETECTION OF SEEDBOXES INBITTORRENT NETWORK BAKALÁŘSKÁ PRÁCE BACHELOR’S THESIS AUTOR PRÁCE MARTIN GRNÁČ AUTHOR VEDOUCÍ PRÁCE Ing. LIBOR POLČÁK, Ph.D. SUPERVISOR BRNO 2018 Abstrakt Bakalárska práca sa venuje problematike sledovania a detekcie seedboxov v sieti BitTorrent za pomoci technológie netflow. V teoretickej časti je predstavená a popísaná architektúra P2P, základy a kľúčové pojmy architektúry BitTorrent a teoretická definícia seedboxu. Taktiež sú tu rozobrané metódy pomocou ktorých sa dá detekovať sieťová komunikácia a ďalej je uvedená analýza seedboxov v sieti a hľadanie ich charakteristík. Na základe týchto znalostí a sledovaní je navrhnutá sada nástrojov, ktoré napomáhajú ich detekcií. V praktickej časti je predstavená implementácia týchto nástrojov a výsledky ich testovania. Abstract Bachelor’s thesis is focused on issues with monitoring and detection of seedboxes in Bit- Torrent network with help of netflow technology. In the theoretical part of this thesis is introduced and described P2P architecture, basics and key terms of BitTorrent architec- ture and theoretical definition of seedbox. There are also described specific methods which can be used for detection of network communication and next there is described process of seedbox analysis in network and process of finding its characteristics. On base of this kno- wledge and observations is designed a set of tools,which help with detection of seedboxes. In the practical part of this work is presented implementation of these tools and results of testing these tools. Kľúčové slová BitTorrent, seedbox, detekcia, netflow, analýza, sieťová prevádzka, P2P, netflow Keywords BitTorrent, seedbox, detection, netflow, analysis, network traffic, P2P, netflow Citácia GRNÁČ, Martin.
    [Show full text]
  • No Ad Torrent Downloader No Ad Torrent Downloader
    no ad torrent downloader No ad torrent downloader. Completing the CAPTCHA proves you are a human and gives you temporary access to the web property. What can I do to prevent this in the future? If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware. If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices. Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the Chrome Web Store. Cloudflare Ray ID: 67a27aef1d21c3d9 • Your IP : 188.246.226.140 • Performance & security by Cloudflare. BitCloudTorrent Downloader (No Ad) for PC. Download BitCloudTorrent Downloader (No Ad) PC for free at BrowserCam. Foossi Inc. published BitCloudTorrent Downloader (No Ad) for Android operating system mobile devices, but it is possible to download and install BitCloudTorrent Downloader (No Ad) for PC or Computer with operating systems such as Windows 7, 8, 8.1, 10 and Mac. Let's find out the prerequisites to install BitCloudTorrent Downloader (No Ad) on Windows PC or MAC computer without much delay. Select an Android emulator: There are many free and paid Android emulators available for PC and MAC, few of the popular ones are Bluestacks, Andy OS, Nox, MeMu and there are more you can find from Google. Compatibility: Before downloading them take a look at the minimum system requirements to install the emulator on your PC.
    [Show full text]
  • AB 1699 Page 1
    AB 1699 Page 1 Date of Hearing: April 30, 2019 ASSEMBLY COMMITTEE ON PRIVACY AND CONSUMER PROTECTION Ed Chau, Chair AB 1699 (Levine) – As Amended April 22, 2019 SUBJECT: Telecommunications: public safety customer accounts: states of emergency SUMMARY: This bill would prohibit, among other things, a mobile internet service provider (ISP) from impairing or degrading the lawful internet traffic of its public safety customer accounts, subject to reasonable network management, as specified, during a state of emergency declared by the President or the Governor, or upon the declaration of a local emergency by an official, board, or other governing body vested with authority to make such a declaration in any city, county, or city and county. This bill would state that the Legislature finds and declares that this bill is adopted pursuant to the police power granted to the State of California under the United States Constitution and cannot be preempted by the Federal Communications Commission (FCC), and that the bill ensures police and emergency services personnel have access to all of the resources necessary for them to operate effectively during a state of emergency. EXISTING LAW: 1) Declares it unlawful for a fixed or mobile ISP, insofar as the provider is engaged in providing fixed broadband internet access service, to engage in certain activities, including, among other things: Blocking lawful content, applications, services, or nonharmful devices, subject to reasonable network management. Impairing or degrading lawful internet traffic on the basis of internet content, application, or service, or use of a nonharmful device, subject to reasonable network management. Unreasonably interfering with, or unreasonably disadvantaging, either an end user’s ability to select, access, and use broadband internet access service or the lawful internet content, applications, services, or devices of the end user’s choice, or an edge provider’s ability to make lawful content, applications, services, or devices available to end users, subject to reasonable network management.
    [Show full text]
  • Zscaler Bandwidth Control Ensures Your Mission-Critical Applications, Like Office 365, Don’T Take a Back Seat to Youtube, OS Updates, and Streaming Content
    DATA SHEET Zscaler™ Bandwidth Control Prioritize business applications over recreational traffic Zscaler Bandwidth Control ensures your mission-critical applications, like Office 365, don’t take a back seat to YouTube, OS updates, and streaming content. The challenge of managing bandwidth in a UTM/Firewall Appliance Sprawl cloud world Leading organizations are moving toward local Internet breakouts to ensure a fast user experience and realize the full agility and cost-saving benefits of the cloud. With more traffic bound for the Internet, it is essential that business apps, like Office 365, are prioritized over YouTube, Spotify, and other recreational traffic like live-streaming sporting events. One way to route traffic locally and police bandwidth is to deploy next- generation firewalls or UTM appliances in each location, but this approach creates costly, unmanageable appliance sprawl. User experience also HQ DATA CENTER suffers with an appliance-based approach because appliances are not designed for bandwidth shaping and will drop packets and interrupt streaming video. And, because this approach is implemented in the last mile, instead of the cloud, the enterprise itself remains vulnerable to bottlenecks and bandwidth contention. Break Free with Zscaler A better approach: Zscaler Bandwidth Control With the majority of your users and applications in the cloud, and most of your traffic now bound for the Internet, it makes sense to move your security and controls to the cloud, too. By implementing Zscaler Bandwidth Control — part of the Zscaler Cloud Security Platform — you can route traffic locally to the Internet, providing great performance and the same level of protection for all users, across all locations.
    [Show full text]
  • Установка И Настройка Rtorrent+Rutorrent+Nginx+Php-Fpm В Arch Linux 1 / 9
    УСТАНОВКА И НАСТРОЙКА RTORRENT+RUTORRENT+NGINX+PHP-FPM В ARCH LINUX 1 / 9 Установка и настройка rtorrent+rutorrent+nginx+php-fpm в Arch Linux Предыстория Для работы с торрентами я достаточно долго использовал ktorrent. Сей клиент мои потребности в удобном управлении закачками удовлетворял полностью, пока я не заметил, что на популярных торрентах загрузка процессора доходила до 50% (а с uTP — ещё больше), а потребление памяти в и без того жирном KDE стало неприятно бросаться в глаза. Было решено сменить KDE на xfce (это отдельная история), а программу для торрентов подобрать с хорошим функционалом и удобным управлением. Перепробовав transmission, deluge и rtorrent, я остановлися на последнем. О том, как настроить rtorrent+rutorrent+nginx+php-fpm, и будет под катом. Почему так? Сразу хочу ответить, почему выбраны именно означенные инструменты. Arch Linux. Об этом дистрибутиве можно говорить достаточно долго, мне нравится его организация и философия в целом, и я могу его использовать для себя с максимальной эффективностью. Кому интересно более детально прочитать о нём, смотрите сюда и сюда. nginx. Я впечатлён тем, как эта маленькая штука выполняет свою работу, экономя память, гибко настраиваясь и предоставляя весь необходимый мне функционал. php-fpm. Можно настроить количество рабочих потоков, в связке с nginx даёт Linux для всех УСТАНОВКА И НАСТРОЙКА RTORRENT+RUTORRENT+NGINX+PHP-FPM В ARCH LINUX 2 / 9 замечательную производительность. rtorrent. Малое потребление ресурсов, хорошо настраивается. rutorrent. Активно развивается, имеет приятный интерфейс. Установка необходимого программного обеспечения Будем исходить из того, что Arch Linux на компьютере уже стоит, а пользователь знаком с его пакетной системой. Чтобы установить веб-часть связки, выполняем команду: sudo pacman -S nginx php-fpm rtorrent и librtorrent я рекомендую устанавливать с AUR'а, там есть замечательный PKGBUILD под названием rtorrent-color, делающий скучный консольный интерфейс более приятным (если будете им пользоваться), и libtorrent-extended, имеющий дополнительные патчи.
    [Show full text]
  • Master's Thesis
    MASTER'S THESIS Analysis of UDP-based Reliable Transport using Network Emulation Andreas Vernersson 2015 Master of Science in Engineering Technology Computer Science and Engineering Luleå University of Technology Department of Computer Science, Electrical and Space Engineering Abstract The TCP protocol is the foundation of the Internet of yesterday and today. In most cases it simply works and is both robust and versatile. However, in recent years there has been a renewed interest in building new reliable transport protocols based on UDP to handle certain problems and situations better, such as head-of-line blocking and IP address changes. The first part of the thesis starts with a study of a few existing reliable UDP-based transport protocols, SCTP which can also be used natively on IP, QUIC and uTP, to see what they can offer and how they work, in terms of features and underlying mechanisms. The second part consists of performance and congestion tests of QUIC and uTP imple- mentations. The emulation framework Mininet was used to perform these tests using controllable network properties. While easy to get started with, a number of issues were found in Mininet that had to be resolved to improve the accuracy of emulation. The tests of QUIC have shown performance improvements since a similar test in 2013 by Connectify, while new tests have identified specific areas that might require further analysis such as QUIC’s fairness to TCP and performance impact of delay jitter. The tests of two different uTP implementations have shown that they are very similar, but also a few differences such as slow-start growth and back-off handling.
    [Show full text]
  • Kubuntu Desktop Guide
    Kubuntu Desktop Guide Ubuntu Documentation Project <[email protected]> Kubuntu Desktop Guide by Ubuntu Documentation Project <[email protected]> Copyright © 2004, 2005, 2006 Canonical Ltd. and members of the Ubuntu Documentation Project Abstract The Kubuntu Desktop Guide aims to explain to the reader how to configure and use the Kubuntu desktop. Credits and License The following Ubuntu Documentation Team authors maintain this document: • Venkat Raghavan The following people have also have contributed to this document: • Brian Burger • Naaman Campbell • Milo Casagrande • Matthew East • Korky Kathman • Francois LeBlanc • Ken Minardo • Robert Stoffers The Kubuntu Desktop Guide is based on the original work of: • Chua Wen Kiat • Tomas Zijdemans • Abdullah Ramazanoglu • Christoph Haas • Alexander Poslavsky • Enrico Zini • Johnathon Hornbeck • Nick Loeve • Kevin Muligan • Niel Tallim • Matt Galvin • Sean Wheller This document is made available under a dual license strategy that includes the GNU Free Documentation License (GFDL) and the Creative Commons ShareAlike 2.0 License (CC-BY-SA). You are free to modify, extend, and improve the Ubuntu documentation source code under the terms of these licenses. All derivative works must be released under either or both of these licenses. This documentation is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE AS DESCRIBED IN THE DISCLAIMER. Copies of these licenses are available in the appendices section of this book. Online versions can be found at the following URLs: • GNU Free Documentation License [http://www.gnu.org/copyleft/fdl.html] • Attribution-ShareAlike 2.0 [http://creativecommons.org/licenses/by-sa/2.0/] Disclaimer Every effort has been made to ensure that the information compiled in this publication is accurate and correct.
    [Show full text]
  • Bittorrent's Been Around for a Whopping Ten Years, but It Continues to Evolve and Remains One of the Best File-Sharing Tools Available
    BitTorrent's been around for a whopping ten years, but it continues to evolve and remains one of the best file-sharing tools available. If you really want to make your downloads soar—and keep Big Brother out of your business—this guide's for you. We showed you how to get started sharing and downloading files with BitTorrent a few years ago, and most of that still applies, but if you're looking to up your BitTorrent skills, things have changed a lot since then. In fact, some of you may find BitTorrent a bit old school for your tastes. Sure, the ISPs are cracking down and throttling peer-to-peer users, and you have other great file-sharing alternatives like Usenet, but that doesn't mean BitTorrent doesn't still have a place in your routine. It's pretty easy to ward off prying eyes with today's BitTorrent clients, and while Usenet is certainly great, BitTorrent is still more widespread. As such, it tends to have a better selection on certain things, and is at the very least a good fallback method for when you don't find what you're looking for elsewhere. After all, there's no reason you have to be loyal to only one file-sharing protocol. This intermediate guide to BitTorrent is designed to help you do three things: jack up your speeds (without consuming your bandwidth) and keep unwanted snoopers from seeing what you're doing. We've divided them up into three sections: * Increase Your Speed and Privacy with a Few Easy Settings * Keep That Newfound Speed from Hijacking All Your Bandwidth * Really Hide Your Traffic with External Solutions For the purposes of this guide, we're focusing on two BitTorrent clients: uTorrent for Windows and Transmission for Mac OS X.
    [Show full text]
  • FCC Jurisdiction Over ISPS in Protocol-Specific Bandwidth Throttling Andrew Gioia University of Michigan Law School
    Michigan Telecommunications and Technology Law Review Volume 15 | Issue 2 2009 FCC Jurisdiction over ISPS in Protocol-Specific Bandwidth Throttling Andrew Gioia University of Michigan Law School Follow this and additional works at: http://repository.law.umich.edu/mttlr Part of the Administrative Law Commons, Communications Law Commons, and the Internet Law Commons Recommended Citation Andrew Gioia, FCC Jurisdiction over ISPS in Protocol-Specific Bandwidth Throttling, 15 Mich. Telecomm. & Tech. L. Rev. 517 (2009). Available at: http://repository.law.umich.edu/mttlr/vol15/iss2/7 This Note is brought to you for free and open access by the Journals at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in Michigan Telecommunications and Technology Law Review by an authorized editor of University of Michigan Law School Scholarship Repository. For more information, please contact [email protected]. NOTE FCC JURISDICTION OVER ISPS IN PROTOCOL-SPECIFIC BANDWIDTH THROTTLING Andrew Gioia* Cite as: Andrew Gioia, FCC Jurisdictionover ISPs in Protocol-SpecificBandwidth Throttling, 15 MICH. TELECOMM. TECH. L. REV. 517 (2009), available at http://www.mttlr.org/volfifteen/gioia.pdf I. INTRODUCTION ......................................................................... 518 I. TECHNICAL AND PROCEDURAL BACKGROUND ......................... 519 A . The BitTorrent Protocol..................................................... 519 B. Comcast's Protocol-SpecificDiscrimination Policy .......... 520 III. THE FCC
    [Show full text]
  • Oxygen-3 User Guide
    Oxygen-3 User Guide Model Oxygen-3 3066 Beta Avenue | Burnaby, B.C. | V5G 4K4 Sales: 1.877.985.2878 \ 604.294.4465 Revision Rev 1.9 Support: 1.844.462.9773 \ 778.462.9773 [email protected] Firmware Rev 5.0 Revision Control 2 Revision Control Description Revision Date Release Update 1.1 04-Mar-2015 Minor Update 1.2 23-Sep-2015 Update for firmware rev. 4.3 1.3 29-Sep-2015 Update for firmware rev. 4.4 - 4.5 1.4 18-Dec-2015 Update for firmware rev. 4.6 - 4.7 1.5 09-Jun-2016 Update for firmware rev. 4.8 1.6 11-Aug-2016 Added Chapter on WLAN 1.7 21-Sept-2016 Update for firmware rev. 4.9 1.8 09-Jan-2017 Update for firmware rev. 5.0 1.9 10-July-2017 Contents Revision Control .............................................................................................................................................. 2 Contents .......................................................................................................................................................... 2 1 Legal Notices ........................................................................................................................................... 6 1.1 Regulatory Restrictions ................................................................................................................... 6 1.2 Electromagnetic Interference (EMI) – United States FCC Information ........................................... 7 1.3 Electromagnetic Interference (EMI) – Canada Information ........................................................... 7 1.4 Li-Ion Battery ..................................................................................................................................
    [Show full text]