The Future of Bittorrent Technology

Total Page:16

File Type:pdf, Size:1020Kb

The Future of Bittorrent Technology COMMENTS Peering Beyond Today’s Internet File Sharing Concerns: The Future of BitTorrent Technology Adam V. Vickers* I. INTRODUCTION ................................................................................. 133 II. BRIEF HISTORY OF P2P TECHNOLOGY ............................................. 134 A. Technical Explanation of BitTorrent Technology.................. 135 B. Recent Legal Attacks on BitTorrent....................................... 138 III. SECONDARY COPYRIGHT LIABILITY DOCTRINE .............................. 139 A. The Doctrines of Contributory and Vicarious Copyright Infringement ............................................................................ 139 B. Direct Third-Party Infringement ............................................ 140 C. A & M Records v. Napster ..................................................... 141 D. In re Aimster Copyright Litigation......................................... 142 E. MGM v. Grokster.................................................................... 143 IV. INDUCEMENT RULE APPLIED TO BITTORRENT TECHNOLOGY......... 145 A. BitTorrent Software Developers............................................. 145 B. Tracker Web Site Owner......................................................... 145 V. SEVENTH CIRCUIT SONY APPLICATION............................................ 146 A. BitTorrent Software Developers............................................. 146 B. Tracker Web Site Owners....................................................... 148 VI. LEGAL EVOLUTION: CONTEMPORARY APPLICATION OF THE SECONDARY COPYRIGHT LIABILITY DOCTRINE? ............................ 149 VII. CONCLUSION .................................................................................... 150 I. INTRODUCTION Technological progression over the past twenty-five years has led brilliant and innovative minds to develop methods of communication which continually shatter the bounds of information transfer. While such advancements certainly benefit society, they also have the power to undercut the very foundations upon which certain aspects of our world rest. These foundations are protected by the delicate balance achieved * J.D. candidate 2006, Tulane University School of Law. The author extends his gratitude to Professor Christopher A. Cotropia, Tulane University School of Law C.J. Morrow Research Associate Professor of Law, for his guidance in writing this Comment. 133 134 TUL. J. TECH. & INTELL. PROP. [Vol. 8 through copyright law. Article I, Section 8, Clause 8 of the United States Constitution provides Congress the power to legislate “[t]o promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.” The careful attention we afford to striking a balance between incentive to create and public dissemination is called into question more often than ever because of advancements made after enactment of our current laws. As a result, courts have struggled over the problem of forcing new technology into current copyright doctrine, constantly calling upon our legislators to resolve the issues in light of society’s best interest. II. BRIEF HISTORY OF P2P TECHNOLOGY The increased ability to transfer large amounts of information over the Internet has evolved into “peer-to-peer” (P2P) file sharing between individual users.1 This activity involves Internet users connecting to each others’ computers over the Internet for the purpose of sharing digital computer files.2 In some cases, the users create and distribute copies of protected works without authorization, a practice strictly prohibited by copyright law.3 Napster, a centralized file sharing service, provided the original online network through which users began trading music files.4 Napster employed the client-server model, the most common method by which files are transferred over the Internet.5 In this model, the user is the “client,” the server is the Web site proprietor offering downloadable information, and a central index keeps track of the information shared between two clients (also known as “peers” and “users”).6 For example, in the Napster scenario, the client first would register his or her computer with Napster (the server) and would be granted access to the central directory of MP3 files, which would include all other online peers with files available for sharing.7 When the client wished to download a file, 1. Answers.com, File Sharing, http://www.answers.com/topic/filesharing (last visited Feb. 7, 2006). 2. See id. 3. See 17 U.S.C. § 106 (2000); Answers. com, supra note 1. 4. See Answers.com, supra note 1. The files were traded in MPEG-3 format, commonly known as MP3. Id. 5. See Brian’s BitTorrent FAQ and Guide, http://dessent.net/btfaq (last visited Apr. 6, 2006). 6. See Jesse M. Feder, Is Betamax Obsolete: Sony Corp. of America v. Universal City Studios, Inc. in the Age of Napster, 37 CREIGHTON L. REV. 859, 863-64 (2004). 7. See A & M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1011-12 (9th Cir. 2001). 2006] THE FUTURE OF BITTORRENT TECHNOLOGY 135 he or she would simply run a query in the Napster server.8 The client would then select one or more peers from which he or she wanted to download the desired file.9 At that point, the Napster server linked the two peers and monitored the entire file transfer between them, recording a log of the activity in the server’s central directory.10 Napster’s role as the server and the central directory ultimately led to its demise, which is briefly discussed below.11 Since the advent of P2P sharing, computer gurus have developed more efficient methods to speed up the process. A major operational problem with the client-server model was the slow speed associated with downloading large files.12 “[I]t takes a great deal of bandwidth and server resources to distribute” large or very popular files since communications travel through the central server.13 Napster was unable at times to provide the required bandwidth to allow for reasonable sharing speeds. As a result, clients’ requests were placed in long “queues” before they were granted access to the requested files.14 This prompted users to disconnect and hence the network proved insufficient to meet its demands at times.15 A. Technical Explanation of BitTorrent Technology The operational failure of the client-server model prompted technology experts to develop a more efficient approach to P2P sharing.16 Their answer has been decentralization, which is the primary characteristic of BitTorrent technology.17 As a result of the ever- increasing demand for faster data transfer, BitTorrent file sharing technology has recently gained widespread popularity among legitimate and illicit file sharers alike. Developed by Bram Cohen, a twenty-eight- year-old Seattle resident, BitTorrent was first released three years ago 8. See generally id. at 1012. 9. See id. 10. See id. at 1011-12. 11. See id. at 1020-24. 12. See Brian’s BitTorrent FAQ and Guide, supra note 5. 13. Brian’s BitTorrent FAQ and Guide; How Does BitTorrent Compare to Other Forms of File Transfer?, http://btfaq.com/serve/cache/4.html (last visited Apr. 6, 2006). 14. See generally Brian’s BitTorrent FAQ and Guide, supra note 5. Such a situation is comparable to customers remaining “on hold” when phoning their cable service provider’s “customer service” department because of the “high volume of calls” they may be experiencing at that time. Only a limited number of phone lines are available, and only a limited number of clients may share certain files. Therefore, as customer service departments and music files grow more popular, clients stand in line longer. Id. 15. See id. 16. See Answers.com, supra note 1. 17. See id. 136 TUL. J. TECH. & INTELL. PROP. [Vol. 8 with the intent to attract music enthusiasts to share concert videos over the Internet.18 Thousands, if not millions, of illicit traders are now attracted to it because they can quickly download digital-quality, pirated movies from online peers in relatively short time.19 This Comment will proceed with respect to issues presented by illicit file sharing via BitTorrent technology. With BitTorrent, individuals generally share files on a one-to-one basis.20 First, an individual creates a “seed” file (identified by the .torrent file) using BitTorrent software.21 A “torrent” is a small metadata file the client receives from the Web server (ending in .torrent).22 “‘Metadata’ here means that the file contains information about the data [the client] want[s] to download, not the data itself.”23 The “seed” file is a complete source file (i.e., the movie).24 It includes the file’s name, size, and a “tracker” server.25 Once the seed has been planted, a client wishing to download the file must first download the BitTorrent software, which is available on many Internet sites.26 Next, the client clicks on a torrent link posted on a Web site, which opens using the BitTorrent software recently downloaded by the client.27 The client then communicates to the tracker, or file sharing index, that he is ready to download the file (or movie, in our case).28 The “tracker” plays an integral role in the file sharing activity. It generally behaves like a “matchmaker, keeping track of who’s downloading the file and matching them up with others who are doing the same.”29 It also provides clients with a list of other users who have 18. See Paul Boutin, Caveat MPAA: Meet BitTorrent, the File Sharing Network That Makes Trading Movies a Breeze, SLATE, Feb. 27, 2004, http://slate.msn.com/id/2096316.
Recommended publications
  • Operation D-Elite Results in Jail Time for Bittorrent Admin by Jessie B
    Operation D-Elite Results in Jail Time for BitTorrent Admin By Jessie B. Sweetland Daniel Dove, an administrator of EliteTorrent.org, a peer-to-peer (P2P) BitTorrent site was convicted on July 28, 2008 of one count each of conspiracy and copyright infringement for his involvement with the site. On September 9, 2008 Dove was sentenced to a term of 18 months of incarceration and a $20,000 fine. The FBI and the U.S. Immigration and Customs Enforcement (ICE) shut the site down on May 25, 2005 as part of Operation D-Elite. Agents of the FBI and ICE targeted EliteTorrent primarily for its illegal distribution of copyrighted movies. The Department of Justice reported that the site had a copy of Star Wars Episode III: Revenge of the Sith available for download six hours before it was shown in theatres. Users downloaded the movie 10,000 times within the following 24 hours. At its peak the site had over 125,000 users that downloaded approximately 700 movie titles over 1.1 million times. Several other BitTorrent sites have shut down in recent years, including LokiTorrent and SuprNova.org due to threats of legal action or a legal shut down. Shutting down BitTorrent sites does little to deter users of P2P networks. As quickly as one site shuts down users move to other sites, many of which are hosted outside of the United State and therefore are harder for the United States government to control. Dove’s conviction follows the convictions of several other administrators’ for the P2P network, including Grant Stanley and Scott McCausland who each received five months incarceration, followed by five months home confinement and a $3,000 fine.
    [Show full text]
  • P2P and Bittorrent
    inf5040 - Presentation by group 1 nghial, baardehe, chricar 30.10.08 Goals of today After this lecture you should have a general understanding of what P2P and bittorrent is be able to recognize the main differences of bitTorrent and other P2P networks A way of organizing resource sharing in computer networks What is P2P? Server/client model Peer-to-peer model Characteristics of P2P networks Peers act as equals Peers function as both client and server No central server managing the network No central router Examples of ”pure” P2P networks Gnutella, Freenet (filesharing) In short Decentralization and multirole BUT! Most networks and applications described as P2P actually contain or rely on some non-peer elements History 1970 – SMTP, NNTP (Usenet) One process both server and client IBM, 1984 ”Advanced Peer to Peer Networking” Software for filesharing in a LAN 1990 – IRC (DCC), MBONE One client can both send and receive 1997 – Napster Created a lot of controversy Convicted because of the centralized file indexing Advantages of P2P networks Better performance and reliability compared to server/client scheme Popular resources will be available at several locations Principle of locality -> less delay and faster transmission Overlay routing Application layer routing (middleware) Two ways of searching for files Flooding DHT (Distributed Hash Table) Area of application Mostly used in ad hoc networks Often categorized by what it’s used for Filesharing Media streaming Telephony (skype) Discussion forums Used to distribute
    [Show full text]
  • File Magic-I1180FB0.MAG
    FOR IMMEDIATE RELEASE: Thursday, May 12, 2005 MPAA TAKES NEW ACTION AGAINST TV SHOW THIEVES Notes Decrease in BitTorrent Activity Since Recent Campaign Began Los Angeles -- In its ongoing effort to crack down on Internet thieves who steal the copyrighted creative works of its member studios, the Motion Picture Association of America, Inc. (MPAA) today announced that it is filing lawsuits against six highly trafficked BitTorrent websites responsible for the illegal swapping of millions of dollars of motion picture and television programming. This is the first time that the MPAA has targeted TV-oriented sites for illegally swapping TV shows which has become a serious and growing problem. An Internet-monitoring company called Envisional reported recently that TV show piracy increased by 150 percent just in the past year. “Internet thievery of all creative materials is unacceptable and these thieves need to realize they are not anonymous,” said MPAA President and CEO Dan Glickman. “There are thousands of people in the entertainment industry who are working to develop, produce, and promote television shows. Those shows and those jobs are worth protecting. Every television series depends on other markets-syndication, international sales – to earn back the enormous investment required to produce the comedies and dramas we all enjoy and those markets are substantially hurt when that content is stolen. On these sites, anyone in the world can download entire television seasons in a single click.” MPAA officials said they have been making progress in shutting down many of the BitTorrent sites that are dedicated to illegally swapping movies. Over 90 percent of the sites that have been sued have been shut down entirely.
    [Show full text]
  • Copyright and Shared Networking Technologies
    Copyright and Shared Networking Technologies By Gaetano Dimita A Thesis Submitted for the Degree of Doctor of Philosophy Queen Mary, University of London 2010 1 I confirm that the work presented in the thesis is my own and all references are cited accordingly. I accept that the College has the right to use plagiarism detection software to check the electronic version of the thesis. Gaetano Dimita 2 Abstract The technological zeitgeist has transformed the social-cultural, legal and commercial aspects of society today. Networking technologies comprise one of the most influential factors in this. Although this transformation can be discounted as a mere historical phenomenon dating back to the advent of the printing press, empirical data concerning usage of these technologies shows that there has been a radical shift in the ability to control the dissemination of copyright works. Networking technologies allow, in an unprecedented manner, user-initiated activities including perfect replications, instantaneous dissemination, and abundant storage. They are immune to technological attempts to dismantle them, and impervious to legal attempts to control and harness them. They affect a global audience, which in turn, undermine at negligible costs, the legal and business parameters of copyright owners. The problem is whether it will now be possible to establish a copyright framework which balances the interests of the following groups: (a) copyright owners in their control of the dissemination of their works; (b) authors demanding remuneration for the exploitation of their works; (c) users wishing to consume works with clear immunity guidelines using networked technologies; (d) technologists striving to continuously innovate without legal and policy restrictions.
    [Show full text]
  • The Matrix Report
    This is Matrix Report draft v 1.0 This report has been conducted in the spirit and honor of one of our most precious rights: Freedom of Speech. This work is totally not-for-profit. All material herein is to be treated and protected as Archived for Educational Purposes Use Under U.S.C. Title 17 Section 107. Therefore, those who would wish to censor this work, or silence us, must first eradicate the laws of free speech. Please bear in mind that I am not a professional writer, just doing my best to come forward with years of painstaking research. Check in for new updates and revisions to this ongoing work then re- download new updated drafts. We encourage everyone to download all the Matrix Report Files and repost all our info on your own websites before this information is made to disappear by "Big Brother." Make all the copies you wish, seed it in P2P networks, bulletin boards, Usenet, email it, Digg, Reddit, Facebook, circulated this report anyway you can. Truth will eventually overcome. Behold, for I present to you: THE MATRIX REPORT By Dr. Houdini, PhZ “None are more hopelessly enslaved than those who falsely believe they are free” ..:EMANCIPATE YOURSELF FROM MENTAL SLAVERY:.. "he who has an ear, let him hear, he who has eyes, let him see" For it is written: "the truth shall set you free" TABLE OF CONTENTS: INTRODUCTION TO THE MATRIX THE BIG PICTURE THE ULTIMATE COSA NOSTRA - THE MASTER RULING ELITE AGENCIES OF DEATH & DESTRUCTION THE GLOBALIZATION AGENDA AKA: THE "NEW WORLD ORDER" THE MASTERFUL MANIPULATION OF PUBLIC OPINION THE TERRORIST BOOGEYMEN - "THE PERFECT COMMON ENEMY" MOSSAD/CIA/Mi5 FALSE FLAG CENTRAL 911 THE GREATEST HOAX IN HISTORY - CIA/PENTACON "OPERATION 911 REICHSTAG FIRE" WHAT IS THE MATRIX THE FINANCIAL INDUSTRIAL MATRIX - THE OVERLORDS of CAPITALISM WEALTH vs.
    [Show full text]
  • Bittorrent - Wikipedia, the Free Encyclopedia File:///H:/Bittorrent.Htm
    BitTorrent - Wikipedia, the free encyclopedia file:///H:/BitTorrent.htm BitTorrent From Wikipedia, the free encyclopedia This article is about the protocol. For the client, see BitTorrent client. BitTorrent is the name of a peer-to-peer (P2P) file Internet protocol suite distribution protocol, and is the name of a free Layer Protocols software implementation of that protocol. The protocol was originally designed and created by Application DNS, TLS/SSL, The BitTorrent logo programmer Bram Cohen, and is now maintained TFTP, FTP, HTTP, IMAP, IRC, NNTP, by BitTorrent Inc. BitTorrent is designed to POP3, SIP, SMTP, distribute large amounts of data widely without SNMP, SSH, incurring the corresponding consumption in costly TELNET, server and bandwidth resources. CacheLogic BitTorrent, RTP, suggests that BitTorrent traffic accounts for ~35% rlogin, … [1] of all traffic on the Internet, while other sources Transport TCP, UDP, DCCP, are skeptical.[2] SCTP, IL, RUDP, … Network IP (IPv4, IPv6), The original BitTorrent client was written in ICMP, IGMP, ARP, Python. Its source code, as of version 4.0, has been RARP, … released under the BitTorrent Open Source Data link Ethernet, Wi-Fi, License, which is a modified version of the Jabber Token ring, PPP, Open Source License. There are numerous SLIP, FDDI, ATM, compatible clients, written in a variety of DTM, Frame Relay, programming languages, and running on a variety SMDS, … of computing platforms. BitTorrent clients are programs which implement the BitTorrent protocol. Each BitTorrent client is capable
    [Show full text]
  • Bittorrent (Protocol) 1 Bittorrent (Protocol)
    BitTorrent (protocol) 1 BitTorrent (protocol) BitTorrent is a peer-to-peer file sharing protocol used for distributing large amounts of data over the Internet. BitTorrent is one of the most common protocols for transferring large files and it has been estimated that peer-to-peer networks collectively have accounted for roughly 43% to 70% of all Internet traffic (depending on geographical location) as of February 2009.[1] Programmer Bram Cohen designed the protocol in April 2001 and released a first implementation on July 2, 2001.[2] It is now maintained by Cohen's company BitTorrent, Inc. There are numerous BitTorrent clients available for a variety of computing platforms. As of January 2012 BitTorrent has 150 million active users according to BitTorrent Inc.. Based on this the total number of monthly BitTorrent users can be estimated at more than a quarter billion.[3] At any given instant of time BitTorrent has, on average, more active users than YouTube and Facebook combined. (This refers to the number of active users at any instant and not to the total number of unique users.)[4][5] Description The BitTorrent protocol can be used to reduce the server and network impact of distributing large files. Rather than downloading a file from a single source server, the BitTorrent protocol allows users to join a "swarm" of hosts to download and upload from each other simultaneously. The protocol is an alternative to the older single source, multiple mirror sources technique for distributing data, and can work over networks with lower bandwidth so many small computers, like mobile phones, are able to efficiently distribute files to many recipients.
    [Show full text]
  • Universidade Federal Da Bahia Comunidades Privadas Bittorrent
    UNIVERSIDADE FEDERAL DA BAHIA FACULDADE DE COMUNICAÇÃO PROGRAMA DE PÓS-GRADUAÇÃO EM COMUNICAÇÃO E CULTURA CONTEMPORÂNEAS LINEU VILANOVA MIRANDA DE OLIVEIRA COMUNIDADES PRIVADAS BITTORRENT: SEGUINDO OS RASTROS DA ALIANÇA CINÉFILA Salvador 2013 LINEU VILANOVA MIRANDA DE OLIVEIRA COMUNIDADES PRIVADAS BITTORRENT: SEGUINDO OS RASTROS DA ALIANÇA CINÉFILA Dissertação apresentada ao curso de Mestrado da Faculdade de Comunicação da Universidade Federal da Bahia, como requisito parcial à obtenção do grau de Mestre em Comunicação. Orientadora: Profª Drª Maria Lucineide Andrade Fontes. Salvador 2013 LINEU VILANOVA MIRANDA DE OLIVEIRA COMUNIDADES PRIVADAS BITTORRENT: SEGUINDO OS RASTROS DA ALIANÇA CINÉFILA Dissertação apresentada ao curso de Mestrado da Faculdade de Comunicação da Universidade Federal da Bahia, como requisito parcial à obtenção do grau de Mestre em Comunicação e aprovada pela seguinte banca examinadora: ___________________________________ Maria Lucineide Andrade Fontes - Orientadora Doutora em Comunicação e Cultura Contemporânea pela Universidade Federal da Bahia (UFBA). ___________________________________ Mahomed Bamba Doutor em Ciências da Comunicação Comunicação pela Universidade de São Paulo (USP) ___________________________________ Messias Guimarães Bandeira Doutor em Comunicação e Cultura Contemporâneas pela Universidade Federal da Bahia (UFBA) Salvador, 20 de março de 2013. À minha família AGRADECIMENTOS Essa jornada começou como um sonho há mais de três anos atrás. Há dois anos, virou um projeto de pesquisa e, hoje, é uma dissertação. Durante essa longa caminhada, recebi o apoio de muita gente. Agradeço ao meu pai, Nelson, por sempre acreditar em meus projetos. Agradeço à minha mãe, Vera, a pessoa mais generosa que conheço, por todo amor e carinho que tenho recebido desde que saí do seu ventre. Agradeço aos meus irmãos Genaro e Catarina, amigos que respeito e admiro, por todas as experiências e trocas que me ajudaram a ser quem sou.
    [Show full text]
  • An Introduction to Computer Networks Stanford Univ CS144 Fall 2012
    An Introduction to Computer Networks Stanford Univ CS144 Fall 2012 PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Tue, 09 Oct 2012 17:42:20 UTC Contents Articles --WEEK ONE-- 1 Introduction 2 Internet 2 What the Internet is 20 Internet protocol suite 20 OSI model 31 Internet Protocol 39 Transmission Control Protocol 42 User Datagram Protocol 59 Internet Control Message Protocol 65 Hypertext Transfer Protocol 68 Skype protocol 75 BitTorrent 81 Architectural Principles 95 Encapsulation (networking) 95 Packet switching 96 Hostname 100 End-to-end principle 102 Finite-state machine 107 --END WEEK ONE-- 118 References Article Sources and Contributors 119 Image Sources, Licenses and Contributors 124 Article Licenses License 125 1 --WEEK ONE-- 2 Introduction Internet Routing paths through a portion of the Internet as visualized by the Opte Project General Access · Censorship · Democracy Digital divide · Digital rights Freedom · History · Network neutrality Phenomenon · Pioneers · Privacy Sociology · Usage Internet governance Internet Corporation for Assigned Names and Numbers (ICANN) Internet Engineering Task Force (IETF) Internet Governance Forum (IGF) Internet Society (ISOC) Protocols and infrastructure Domain Name System (DNS) Hypertext Transfer Protocol (HTTP) IP address Internet exchange point Internet Protocol (IP) Internet Protocol Suite (TCP/IP) Internet service provider (ISP) Simple Mail Transfer Protocol (SMTP) Services Blogs · Microblogs · E-mail Fax · File sharing · File transfer Instant messaging · Gaming Podcast · TV · Search Shopping · Voice over IP (VoIP) Internet 3 World Wide Web Guides Outline Internet portal The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (often called TCP/IP, although not all applications use TCP) to serve billions of users worldwide.
    [Show full text]
  • Bittorrent - Wikipedia, the Free Encyclopedia 11/12/13 Create Account Log In
    BitTorrent - Wikipedia, the free encyclopedia 11/12/13 Create account Log in Article Talk Read Edit View history BitTorrent From Wikipedia, the free encyclopedia Main page Contents This article is about the file sharing protocol. For other uses, see BitTorrent (disambiguation). Featured content This article may be too technical for most readers to Current events understand. Please help improve this article to make it Random article understandable to non-experts, without removing the technical Donate to Wikipedia details. The talk page may contain suggestions. (May 2011) Wikimedia Shop BitTorrent is a protocol supporting the practice of Part of a series on Interaction peer-to-peer file sharing that is used to distribute large File sharing Help amounts of data over the Internet. BitTorrent is one of About Wikipedia the most common protocols for transferring large files, Community portal and peer-to-peer networks have been estimated to Recent changes collectively account for approximately 43% to 70% of Technologies Contact page all Internet traffic (depending on geographical location) Peer to peer · BitTorrent­ · Tools as of February 2009.[1] In November 2004, BitTorrent ­File hosting services was responsible for 35% of all Internet traffic.[2] As of Development and societal aspects Print/export February 2013, BitTorrent was responsible for 3.35% Timeline · Legal­ aspects Non-public file sharing Languages of all worldwide bandwidth, more than half of the 6% Anonymous P2P Friend-to-friend­ Darknet­ of total bandwidth dedicated to file sharing.[3] · · · Private P2P­ العربية Azərbaycanca Programmer Bram Cohen, a former University at File sharing networks and services [4] Беларуская Buffalo graduate student in Computer Science, Gnutella / Gnutella2 (G2) · FastTrack­ · Български designed the protocol in April 2001 and released the ­eDonkey · Direct­ Connect · Mininova­ · ­isoHunt The­ Pirate Bay ­Bitcoin Bosanski first available version on July 2, 2001,[5] and the final · · [6] By country or region Català version in 2008.
    [Show full text]
  • Cinema Na Internet. Espaços Informais De Circulação, Pirataria E Cinefilia
    PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO GRANDE DO SUL FACULDADE DE COMUNICAÇÃO SOCIAL PROGRAMA DE PÓS GRADUAÇÃO EM COMUNICAÇÃO SOCIAL ANGELA MARIA MEILI CINEMA NA INTERNET. ESPAÇOS INFORMAIS DE CIRCULAÇÃO, PIRATARIA E CINEFILIA Porto Alegre 2015 PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO GRANDE DO SUL FACULDADE DE COMUNICAÇÃO SOCIAL PROGRAMA DE PÓS GRADUAÇÃO EM COMUNICAÇÃO SOCIAL ANGELA MARIA MEILI CINEMA NA INTERNET. ESPAÇOS INFORMAIS DE CIRCULAÇÃO, PIRATARIA E CINEFILIA Prof. Dr. João Guilherme Barone Reis e Silva Orientador Tese apresentada como pré-requisito parcial para a obtenção do título de Doutor em Comunicação Social, no Programa de Pós-Graduação em Comunicação Social Data da defesa: 31.03.2015 Pontifícia Universidade Católica do Rio Grande do Sul ii CATALOGAÇÃO NA FONTE M513c Meili, Angela Maria Cinema na internet. espaços informais de circulação, pirataria e cinefilia / Angela Maria Meili. – Porto Alegre, 2015. 255 f. Tese (Doutorado) – Faculdade de Comunicação Social, Pós-Graduação em Comunicação Social. PUCRS. Orientador: Prof. Dr. João Guilherme Barone Reis e Silva. 1. Comunicação. 2. Cinema. 3. Pirataria. 4. Internet - Crimes. 5. Cinefilia. 6. BitTorrent – Protocolo. I. Silva, João Guilherme Barone Reis e. II.Título. CDD 791.43 Bibliotecária Responsável Ginamara de Oliveira Lima CRB 10/1204 iii ANGELA MARIA MEILI CINEMA NA INTERNET. ESPAÇOS INFORMAIS DE CIRCULAÇÃO, PIRATARIA E CINEFILIA Tese de Doutorado em Comunicação Social Data de aprovação: 31.03.2015 Banca Examinadora: _________________________________________________________ Prof. Dr. João Guilherme Barone Reis e Silva Orientador _________________________________________________________ Prof. Dra. Miriam de Souza Rossini _________________________________________________________ Prof. Dr. Roberto Tietzmann _________________________________________________________ Prof. Dr. Tiago Coelho Ferreto _________________________________________________________ Prof. Dr. Tiago Ricciardi Correa Lopes Porto Alegre 2015 iv À minha família, que apoiou e iluminou esta jornada acadêmica.
    [Show full text]
  • Downloads Represent a Large Portion of Today’S Which Individual Nodes in the Network (Called "Peers") Act Internet Traffic
    International Journal of Innovative Research in Computer Science & Technology (IJIRCST) ISSN: 2347- 5552, Volume-1, Issue-1, September-2013 Exploring The World Of Collaborative Sharing Over The Internet Through The Use Of A Peer- To-Peer Network Protocol Naveen Chandra Upreti Abstract - P2P downloads represent a large portion of today’s which individual nodes in the network (called "peers") act Internet traffic. Millions of users operate BitTorrent and as both suppliers and consumers of resources, in contrast to generate more than 30% of the total Internet traffic. This the centralized client–server model where client nodes paper mainly examines the working of the BitTorrent P2P request access to resources provided by central servers. protocol explaining the Terminology involved in the In a peer-to-peer network, tasks (such as searching for files BitTorrent community, its advantages over other file sharing protocols, the various popular BitTorrent clients, and the best or streaming audio/video) are shared amongst multiple torrent sites for searching torrents. It also focuses on the interconnected peers who each make a portion of their privacy, security and legal aspects related to its usage, and the resources (such as processing power, disk future technologies - Magnet Links, DHT, and PeX which will storage or network bandwidth) directly available to other increase its effectiveness and popularity. network participants, without the need for centralized coordination by servers[3]. Index Terms— BitTorrent, DHT, P2P, PeX, Torrent I. INTRODUCTION The Internet carries an extensive range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW), the infrastructure to support email, and peer-to- peer networks.
    [Show full text]