Freescale Powerpoint Template

Total Page:16

File Type:pdf, Size:1020Kb

Freescale Powerpoint Template TM September 2013 Processor T1 T2 T1 T2 T1 T2 T1 T2 512KB 6464--bit T1 T2 T1 T2 T1 T2 T1 T2 • 12x e6500, 64b, up to 1.8GHz Power ™ Power ™ Power ™ Power ™ Corenet DDR2/3DDR3 e6500T1Power ™ T2 e6500T1Power ™ T2 e6500T1Power ™ T2 e6500T1Power ™ T2 Platform Cache MemoryMemory • Dual threaded, with128b AltiVec e6500Power ™ e6500Power ™ e6500Power ™ e6500Power ™ ControllerController 32 KB 32 KB 32 KB 32 KB 32 KB 32 KB 32 KB 32 KB • Arranged as 3 clusters of 4 CPUs, with e6500 e6500 e6500 e6500 512KB 6464--bit D-Cache32 KB I-Cache32 KB D-Cache32 KB I-Cache32 KB D-Cache32 KB I-Cache32 KB D-Cache32 KB I-Cache32 KB Corenet DDR2/3DDR3 2MB L2 per cluster; 256KB per thread fetch D-Cache32 KB I-Cache32 KB D-Cache32 KB I-Cache32 KBD -Cache32 KB I-Cache32 KB D-Cache32 KB I-Cache32 KB - Platform Cache MemoryMemory Memory SubSystem D-Cache I-Cache D-Cache I-Cache D-Cache I-Cache D-Cache I-Cache Pre ControllerController 64-bit • 1.5MB CoreNet Platform Cache w/ECC 2MB Banked L2 512KB 64-bit 2MB Banked L2 Corenet DDR2/3DDR3 • 3x DDR3 Controllers up to 2.1GHz Platform Cache MemoryMemory 2MB Banked L2 ControllerController • Each with up to 1TB addressability (40 bit Security Fuse Processor physical addressing) Security Monitor CoreNet™ Coherency Fabric • HW Data Prefetching Peripheral Access 2x USB 2.0 w/PHY PAMU PAMU PAMU PAMU Mgmt Unit CoreNet Switch Fabric IFC FMan FMan Real Time Debug High Speed Serial IO Power Management DCE Security Queue 2xDMA Watchpoint Parse, Classify, Parse, Classify, • 4 PCIe Controllers, with Gen3 1.0 5.0 Cross SD/MMC Mgr. Distribute Distribute Trigger 2.0 • SR-IOV support 2.0 2x DUART HiGig DCB HiGig DCB Perf CoreNet Pattern • 2 sRIO Controllers 4x I2C 1G 1G 1G 1G 1G 1G Monitor Trace Match Buffer 1/ 1/ 1/ 1/ PCIe PCIe sRIO sRIO PCIe SATA PCIe RMAN SATA SPI, GPIO Engine Mgr. 10G 10G 10G 10G Interlaken LA • Type 9 and 11 messaging 1G 1G 1G 1G 1G 1G Aurora 2.0 • Interworking to DPAA via Rman 16-Lane 10GHz SERDES 16-Lane 10GHz SERDES • 1 Interlaken Look-Aside at up to10GHz • 2 SATA 2.0 3Gb/s • 2 USB 2.0 with PHY Device Datapath Acceleration Network IO • TSMC 28HPM Process • SEC- crypto acceleration 40Gbps • 2 Frame Managers, each with: • 1932-pin BGA package • PME- Reg-ex Pattern Matcher 10Gbps • Up to 25Gbps parse/classify/distribute • 42.5x42.5mm, 1.0mm pitch • DCE- Data Compression Engine 20Gbps • 2x10GE, 6x1GE Power targets • HiGig, Data Center Bridging Support • ~60W thermal max at 1.8GHz • SGMII, QSGMII, XAUI, XFI • ~50W thermal max at 1.5GHz TM 2 Processor • 4x e6500, 64b, 1.2 - 1.8GHz • Dual threaded, with 128b AltiVec T1 T2 T1 T2 T1 T2 T1 T2 • 2MB shared L2; 256KB per thread Power™ Power™ Power™ Power™ Memory Subsystem e6500 e6500 e6500 e6500 • 512KB Platform Cache w/ECC 32 KB 32 KB 32 KB 32 KB 32 KB 32 KB 32 KB 32 KB D-Cache I-Cache D-Cache I-Cache D-Cache I-Cache D-Cache I-Cache • 1x DDR3/3L Controllers up to 2.1GHz 64-bit • Up to 1TB addressability (40 bit physical 512KB DDR3/3LDDR2/3 fetch - Platform Memory addressing) 2MB Banked L2 Pre Cache Controller • HW Data Prefetching Security Fuse Processor Coherency Fabric Switch Fabric Security Monitor High Speed Serial IO IFC PAMU PAMU Peripheral Access Mgmt Unit PAMU Power Management • 4 PCIe Controllers, one at Gen3 three at Real Time Debug Security Parse, Classify, SDXC/eMMC DCE 5.2 Queue Distribute 8ch 8ch 8ch Watchpoint Gen2 1.0 (XoR, Mgr. DMA DMA DMA Cross 2x DUART Trigger • 1 with SR-IOV support CRC) HiGig/+ DCB 4x I2C Perf CoreNet • x8 Gen2 Frame Manager SPI, GPIO Monitor Trace SATA2.0 PME Buffer SATA2.0 • 2 sRIO Controller 2x USB2.0 + PHY RMan 4x 4x PCIe PCIe PCIe PCIe sRIO 2.1 Mgr. sRIO 1 / 2.5 / 10G 1 / 2.5G Aurora • Type 9 and 11 messaging 8-Lane 10GHz SERDES 8-Lane 8GHz SERDES • Interworking to DPAA via RMan • 2 SATA 2.0 3Gb/s • 2 USB 2.0 with PHY Network IO • Up to 25Gbps Simple PCD each direction • 4x1/10GE, 4x1GE or 2.5Gb/s SGMII • XFI, 10GBase-KR, XAUI, HiGig, HiGig+, SGMII, RGMII, 1000Base-KX TM 3 Processor Power Architecture® 256 KB e5500 • 4x e5500, 64b, up to 1.4GHz Backside L2 32/6464-bit-bit • Each with 256KB backside L2 cache Cache 32 KB 32 KB DDR3L/4DDR2/3 256KB D-Cache I-Cache Memory Platform Cache • 256KB Shared Platform Cache w/ECC Controller Security Fuse • Supports up to 64GB addressability (36 Processor CoreNet™ Coherency Security Monitor bit physical addressing) Fabric Peripheral 16b IFC PAMU PAMU PAMU PAMU Access Mgmt Unit Memory SubSystem Power Management Security Parse, Classify, QUICC Real Time Debug Distribute Engine SD/MMC+ 5.x Queue 2xDMA Watchpoint • 32/64b DDR3L/4 Controller up to Cross Mgr. 2x DUART (XoR, Trigger 1G 1G 1G 1G CRC) 1333MHz 2.0 2.0 2x I2C Pattern 8 Port Perf CoreNet SPI, GPIO Switch Monitor Trace Cygnus Switch Fabric Match Buffer SATA SATA PCIe PCIe PCIe Engine Mgr. 1G 1G 1G 1G PCIe 2x USB 2.0 w/PHY TDM/HDLC TDM/HDLC High Speed Serial IO 2.0 1G 1G 1G 1G DIU • 4x PCIe Gen2 Controllers 8-Lane 5GHz SERDES • 2x SATA 2.0, 3Gb/s Power targets Datapath Acceleration • 2x USB 2.0 with PHY • Enable Convection cooled • SEC- crypto acceleration Network IO system design • PME- Reg-ex Pattern • FMan packet Parse/Classify/Distribute • Green Energy Operation Matcher • Lossless Flow Control, IEEE 1588 • Fanless operation quad-core • 3x 10/100/1000 Ethernet Controllers • Packet lossless deepsleep • 8-Port Gigabit Ethernet Switch • Programmable wake-on- QUICC Engine packet • Wake-on-timer / GPIO / • HDLC, 2x TDM USB / IRQ TM 4 P2040 P2041 P3041 T1042 T2080 T2081 Cores 4x e500mc, 4x e500mc, 32b 4x e500mc, 32b 4x e5500, 64b 4x e6500, 64b 4x e6500, 64b 32b Threads 4 4 4 4 8 8 Frequency 667MHz – 1.2 - 1.5GHz 1.2 - 1.5GHz 1.2 - 1.4GHz 1.2 - 1.8GHz 1.5 - 1.8GHz 1.2GHz L2 None 512kB 512kB 1MB 2MB 2MB L3 1MB 1MB 1MB 256kB 512kB 512kB DDR 1x DDR3/3L to 1x DDR3/3L to 1x DDR3/3L to 1x DDR3L/4 to 1x DDR3/3L to 1x DDR3/3L to 1200MT/s 1333MT/s 1333MT/s 1333MT/s 2133MT/s 2133MT/s SerDes 10 to 5GHz 10 to 5GHz 18 to 5GHz 8 to 5GHz 16 to 10GHz 8 to 10GHz Enet 5x 1GE 10GE + 5x 1GE 10GE + 5x 1GE 5x 1GE 4x 1/10GE + 4x 2x 1/10GE + 5x 1GE 1GE PCIe Cntrls 3 at Gen2 3 at Gen2 3 at Gen2 4 at Gen2 3 at Gen2 + 3 at Gen2 + 1 at Gen3 1 at Gen3 SATA2.0 2 2 2 2 2 No USB2.0 2 w/ int. PHY 2 w/ int. PHY 2 w/ int. PHY 2 w/ int. PHY 2 w/ int. PHY 2 w/ int. PHY SRIO/Rman 2 2 2 No 2 No Aurora Yes Yes Yes Yes Yes No TDM/HDLC No No No 2 No No Acceleration SEC, PME SEC, PME SEC, PME SEC, PME, QE SEC, PME, SEC, PME, TM 5 DCE DCE TM • 1Gbps+ WIFI bandwidth per AP moves the policy enforcement to the network edge. 802.11ac • EWLAN APs need to be application aware for effective policy enforcement. • Enterprises are allowing employees to connect BYOD private handhelds to the business network. • Security posture of BYOD is a big concern. • HTTP/S based Apps traffic has been growing Application unabated. • Conventional Stateful inspection firewalls are Firewalls getting upgraded to Application Firewalls. TM 7 • Reliable application detection with 1200+ signatures e.g. YouTube, Netflix, and BitTorrent • Port-agnostic application detection with universal signatures • Detection of HTTPS based apps** • Detection of proprietary encrypted apps** such as Skype • Nested detection for select apps e.g. Facebook photos and games • Encoded and Obfuscated URL support • Hardware acceleration support • Notification Methods . ANSI C Callback . In-Packet Identification • Comprehensive signature distribution infrastructure • Signature Development APIs • Event logging Application encyclopedia is available at www.freescale.com/VortiQa Note: ** Available in Q3 2013 TM 8 • Master Signature Server (MSS) is installed in Freescale datacenter • Serving Signature Server (SSS) are expected to be installed by our OEM customer in their respective datacenters. − Freescale delivers SSS software to OEMs. • Signature Development team uploads new signature releases to MSS periodically. • MSS informs SSSes to download new updates. • VortiQa AIS enabled end customer devices are expected to point to their respective SSS to download the latest updates. TM 9 Sl.No Application Applications CATEGORY 1. Social Networking Facebook, Twitter, Orkut, LinkedIn, Hi5, WordPress, Flixster, Friendster, Tagged, MpSpace, Badoo, Haboo, Bebo. 2. P2P Applications Ares, BitTorrent , DirectConnect P2P, eDonkey protocol, GnuTella, GnuTella 2, Apple Juice P2P, Mute P2P, Mute P2P, Winny P2P, ExoSee, BearShare/iMesh p2p network, Manolito, NeoNet, Zepp Network, SoulSeek, WinMX Peer Network Protocol (WPNP), OpenNap, ANts P2P, XOC link. 3. IMs Google Talk, IRC IM, Jabber, MSN IM, AOL IM, Rediff Bol IM, Yahoo IM 4. DDLs(Direct Download One click hosting sites or Direct Download Links like, 4shared.com, badongo.com, Link) badongo.net, mediafire.com, megashare.com, megashares.com, megaupload.com 4. Tunnel Protocol & GRE, IPsec, GTP, HamachiVPN, IP in IP, SSL, ISAKMP, L2TP, NetMotion, Applications OpenVPN,PPTP, SoftEthernet, SSH, Teredo, Tor, UltraSurf, VoipSwitch VoIP Tunnel, VPN-X, VTun,YourFreedom,SocksICMP Tunnel 5. Streaming Protocol & Youtube, AVI, Flash, Funshion, MMS, MPEG, Octoshape, PPLive, PPStream, Real Applications Media, RTSP, Sopcast, veohtv 6.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Forescout Counteract® Endpoint Support Compatibility Matrix Updated: October 2018
    ForeScout CounterACT® Endpoint Support Compatibility Matrix Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix 2 Table of Contents About Endpoint Support Compatibility ......................................................... 3 Operating Systems ....................................................................................... 3 Microsoft Windows (32 & 64 BIT Versions) ...................................................... 3 MAC OS X / MACOS ...................................................................................... 5 Linux .......................................................................................................... 6 Web Browsers .............................................................................................. 8 Microsoft Windows Applications ...................................................................... 9 Antivirus ................................................................................................. 9 Peer-to-Peer .......................................................................................... 25 Instant Messaging .................................................................................. 31 Anti-Spyware ......................................................................................... 34 Personal Firewall .................................................................................... 36 Hard Drive Encryption ............................................................................. 38 Cloud Sync ...........................................................................................
    [Show full text]
  • Diapositiva 1
    TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos.
    [Show full text]
  • P2P Protocols
    CHAPTER 1 P2P Protocols Introduction This chapter lists the P2P protocols currently supported by Cisco SCA BB. For each protocol, the following information is provided: • Clients of this protocol that are supported, including the specific version supported. • Default TCP ports for these P2P protocols. Traffic on these ports would be classified to the specific protocol as a default, in case this traffic was not classified based on any of the protocol signatures. • Comments; these mostly relate to the differences between various Cisco SCA BB releases in the level of support for the P2P protocol for specified clients. Table 1-1 P2P Protocols Protocol Name Validated Clients TCP Ports Comments Acestream Acestream PC v2.1 — Supported PC v2.1 as of Protocol Pack #39. Supported PC v3.0 as of Protocol Pack #44. Amazon Appstore Android v12.0000.803.0C_642000010 — Supported as of Protocol Pack #44. Angle Media — None Supported as of Protocol Pack #13. AntsP2P Beta 1.5.6 b 0.9.3 with PP#05 — — Aptoide Android v7.0.6 None Supported as of Protocol Pack #52. BaiBao BaiBao v1.3.1 None — Baidu Baidu PC [Web Browser], Android None Supported as of Protocol Pack #44. v6.1.0 Baidu Movie Baidu Movie 2000 None Supported as of Protocol Pack #08. BBBroadcast BBBroadcast 1.2 None Supported as of Protocol Pack #12. Cisco Service Control Application for Broadband Protocol Reference Guide 1-1 Chapter 1 P2P Protocols Introduction Table 1-1 P2P Protocols (continued) Protocol Name Validated Clients TCP Ports Comments BitTorrent BitTorrent v4.0.1 6881-6889, 6969 Supported Bittorrent Sync as of PP#38 Android v-1.1.37, iOS v-1.1.118 ans PC exeem v0.23 v-1.1.27.
    [Show full text]
  • Internet Peer-To-Peer File Sharing Policy Effective Date 8T20t2010
    Title: Internet Peer-to-Peer File Sharing Policy Policy Number 2010-002 TopicalArea: Security Document Type Program Policy Pages: 3 Effective Date 8t20t2010 POC for Changes Director, Office of Computing and Information Services (OCIS) Synopsis Establishes a Dalton State College-wide policy regarding copyright infringement. Overview The popularity of Internet peer-to-peer file sharing is often the source of network resource allocation problems and copyright infringement. Purpose This policy will define Internet peer-to-peer file sharing and state the policy of Dalton State College (DSC) on this issue. Scope The scope of this policy includes all DSC computing resources. Policy Internet peer-to-peer file sharing applications are frequently used to distribute copyrighted materials such as music, motion pictures, and computer software. Such exchanges are illegal and are not permifted on Dalton State Gollege computers or network. See the standards outlined in the Appropriate Use Policy. DSG Procedures and Sanctions Failure to comply with the appropriate use of these resources threatens the atmosphere for the sharing of information, the free exchange of ideas, and the secure environment for creating and maintaining information property, and subjects one to discipline. Any user of any DSC system found using lT resources for unethical and/or inappropriate practices has violated this policy and is subject to disciplinary proceedings including suspension of DSC privileges, expulsion from school, termination of employment and/or legal action as may be appropriate. Although all users of DSC's lT resources have an expectation of privacy, their right to privacy may be superseded by DSC's requirement to protect the integrity of its lT resources, the rights of all users and the property of DSC and the State.
    [Show full text]
  • Title: P2P Networks for Content Sharing
    Title: P2P Networks for Content Sharing Authors: Choon Hoong Ding, Sarana Nutanong, and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory, Department of Computer Science and Software Engineering, The University of Melbourne, Australia (chd, sarana, raj)@cs.mu.oz.au ABSTRACT Peer-to-peer (P2P) technologies have been widely used for content sharing, popularly called “file-swapping” networks. This chapter gives a broad overview of content sharing P2P technologies. It starts with the fundamental concept of P2P computing followed by the analysis of network topologies used in peer-to-peer systems. Next, three milestone peer-to-peer technologies: Napster, Gnutella, and Fasttrack are explored in details, and they are finally concluded with the comparison table in the last section. 1. INTRODUCTION Peer-to-peer (P2P) content sharing has been an astonishingly successful P2P application on the Internet. P2P has gained tremendous public attention from Napster, the system supporting music sharing on the Web. It is a new emerging, interesting research technology and a promising product base. Intel P2P working group gave the definition of P2P as "The sharing of computer resources and services by direct exchange between systems". This thus gives P2P systems two main key characteristics: • Scalability: there is no algorithmic, or technical limitation of the size of the system, e.g. the complexity of the system should be somewhat constant regardless of number of nodes in the system. • Reliability: The malfunction on any given node will not effect the whole system (or maybe even any other nodes). File sharing network like Gnutella is a good example of scalability and reliability.
    [Show full text]
  • The Copyright Crusade
    The Copyright Crusade Abstract During the winter and spring of 2001, the author, chief technology officer in Viant's media and entertainment practice, led an extensive inqUiry to assess the potential impact of extant Internet file-sharing capabilities on the business models of copyright owners and holders. During the course of this project he and his associates explored the tensions that exist or may soon exist among peer-to-peer start-ups, "pirates" and "hackers," intellectual property companies, established media channels, and unwitting consumers caught in the middle. This research report gives the context for the battleground that has emerged, and calls upon the players to consider new, productive solutions and business models that support profitable, legal access to intellectual property via digital media. by Andrew C Frank. eTO [email protected] Viant Media and Entertainment Reinhold Bel/tIer [email protected] Aaron Markham [email protected] assisted by Bmre Forest ~ VI ANT 1 Call to Arms Well before the Internet. it was known that PCs connected to two-way public networks posed a problem for copyright holders. The problem first came to light when the Software Publishers Association (now the Software & Information Industry Association), with the backing of Microsoft and others, took on computer Bulletin Board System (BBS) operators in the late 1980s for facilitating trade in copyrighted computer software, making examples of "sysops" (as system operators were then known) by assisting the FBI in orchestrat­ ing raids on their homes. and taking similar legal action against institutional piracy in high profile U.S. businesses and universities.' At the same time.
    [Show full text]
  • Investigating the User Behavior of Peer-To-Peer File Sharing Software
    www.ccsenet.org/ijbm International Journal of Business and Management Vol. 6, No. 9; September 2011 Investigating the User Behavior of Peer-to-Peer File Sharing Software Shun-Po Chiu (Corresponding author) PhD candidate, Department of Information Management National Central University, Jhongli, Taoyuan, Taiwan & Lecture, Department of Information Management Vanung University, Jhongli, Taoyuan, Taiwan E-mail: [email protected] Huey-Wen Chou Professor, Department of Information Management National Central University, Jhongli, Taoyuan, Taiwan E-mail: [email protected] Received: March 26, 2011 Accepted: May 10, 2011 doi:10.5539/ijbm.v6n9p68 Abstract In recent years, peer-to-peer file sharing has been a hotly debated topic in the fields of computer science, the music industry, and the movie industry. The purpose of this research was to examine the user behavior of peer-to-peer file-sharing software. A methodology of naturalistic inquiry that involved qualitative interviews was used to collect data from 21 university students in Taiwan. The results of the study revealed that a substantial amount of P2P file-sharing software is available to users. The main reasons for using P2P file-sharing software are to save money, save time, and to access files that are no longer available in stores. A majority of respondents use P2P file-sharing software to download music, movies, and software, and the respondents generally perceive the use of such software as neither illegal nor unethical. Furthermore, most users are free-riders, which means that they do not contribute files to the sharing process. Keywords: Peer to peer, File sharing, Naturalistic inquiry 1. Introduction In recent years, Peer-to-Peer (P2P) network transmission technology has matured.
    [Show full text]
  • Public Peer-To-Peer Filesharing Networks’ Evaluation
    PUBLIC PEER-TO-PEER FILESHARING NETWORKS’ EVALUATION J. Lloret Mauri1, B. Molina Moreno2, C. Palau Salvador3, M. Esteve Domingo4 Department of Communications, Polytechnic University of Valencia Camino Vera s/n, Valencia, Spain [email protected], [email protected], [email protected], [email protected] ABSTRACT • Download speed: some internal P2P network, due to Since the recent appearance of P2P file-sharing networks, its internal behaviour, are optimal for downloading many Internet users have chosen this technology to search files of reduced size. Others, however, use for programs, films, songs, etc. Their number of users is multisplitting mechanisms and permit the download growing every day due to the attractive and interesting from multiple sources, making them suitable for content type that can be found and downloaded over these obtaining larger files. networks. In this article six public architectures are analyzed, Gnutella, FastTrack, Opennap, Edonkey, MP2P These parameters are responsible for an architecture and Soulseek, tracking their evolution during a week in becoming very popular or, on the other hand, terms of connected users, number of files and size of disappearing. The above factors can make a P2P network shared files per hour. The results will be compared and more attractive to users of a specific nation due to the discussed with previous measurements taken a year ago. utilization of a specific language or even social trends [7]. These data can be used to design new network models, to It is also interesting to distinguish between a P2P network calculate their performance or to optimize new network and P2P client, the development of which must not be parameters.
    [Show full text]
  • Content, Media & Entertainment
    Content, Media & Entertainment Chicago | Los Angeles | New York | Washington, DC Jenner & Block LLP jenner.com CONTENTS 2 ADVancED MEDIA | CONTENT PROTECTION 8 COpyRIGHT and ENTERTAInmENT LITIGATION 13 BUSINESS LITIGATION FOR ENTERTAINMENT SECTOR COMPANIES 17 IP TRanSacTIONS 18 COpyRIGHT POLIcy and COunSELING 21 ROyalTY and RaTE-SETTING LITIGATION 22 MEDIA AND FIRST AMENDMENT 25 TRADEMARK AND UNFAIR COMPETITION 27 PRIVacy and InfORmaTION GOVERnancE 29 OuR TEam ©2012 Jenner & Block LLP. Jenner & Block is an Illinois Limited Liability Partnership including professional corporations. This publication is not intended to provide legal advice but to provide information on legal matters. Transmission is not intended to create and receipt does not establish an attorney-client relationship. Readers should seek specific legal advice before taking any action with respect to matters mentioned in this publication. The attorney responsible for this publication is Steven B. Fabrizio. Attorney Advertising. Prior results do not guarantee a similar outcome. Content, Media & Entertainment Jenner & Block’s Content, Media & Entertainment practice unites a set of highly skilled and nationally known attorneys who use their legal experience and business savvy to help content providers A nationwide leader in succeed. Whether they are known as copyright lawyers, business helping content creators litigators, First Amendment advocates, IP transactional attorneys, trademark litigators, privacy attorneys, or something else, these safeguard their intellectual lawyers have one thing in common: They understand the highly complex and constantly changing challenges distinct to companies property on the internet and in the content, media and entertainment industries. in other advanced media The Content, Media & Entertainment practice and its attorneys are widely recognized as among the best in the country.
    [Show full text]
  • Ipoque Internet Study 2008/2009
    Internet Study 2008/2009 Hendrik Schulze, Klaus Mochalski For the third year in a row, after 2006 and 2007, ipoque has conducted a compre- hensive study measuring and analyzing Internet traffic in eight regions of the world. The study includes statistical data about popularity and user behavior for all common network protocols. This covers most applications used in today’s Internet such as Web browsing, media streaming, P2P file sharing, one-click file hosting, instant mes- saging, Internet telephony and online games. BitTorrent and eDonkey downloads have been analyzed to classify the transfered files according to their content type. Some of the key findings are: P2P still produces most Internet traffic worldwide al- though its proportion has declined across all monitored regions – loosing users to file hosting and media streaming; regional variations in application usage are very prominent; and Web traffic has made its comeback due to the popularity of file host- ing, social networking sites and the growing media richness of Web pages. Introduction What Is New? What Is Different? This study uses the same methodology as the 2007 Internet Key facts Study1 to classify network traffic according to protocol and protocol class. Several of ipoque’s ISP and university cus- • 8 regions: Northern Africa, Southern Africa, South tomers agreed to provide anonymized traffic statistics col- America, Middle East, Eastern Europe, Southern lected by PRX Traffic Managers installed in their networks. Europe, Southwestern Europe, Germany Protocols and applications are detected with a combination • 1.3 petabytes of user traffic monitored of layer-7 deep packet inspection (DPI) and behavioral • 1.1 million users represented traffic analysis.
    [Show full text]