Dynamics and Cooperation: Algorithmic Challenges in Peer-To-Peer Computing

Total Page:16

File Type:pdf, Size:1020Kb

Dynamics and Cooperation: Algorithmic Challenges in Peer-To-Peer Computing DISS. ETH NO. 17731 TIK-Schriftenreihe Nr. 96 Dynamics and Cooperation Algorithmic Challenges in Peer-to-Peer Computing A dissertation submitted to the SWISS FEDERAL INSTITUTE OF TECHNOLOGY ZURICH for the degree of Doctor of Sciences presented by STEFAN SCHMID MSc in Computer Science, ETH Z¨urich born 31.07.1978 citizen of Hedingen ZH accepted on the recommendation of Prof. Dr. Roger Wattenhofer, ETH Zurich, examiner Prof. Dr. Boaz Patt-Shamir, Tel Aviv University, co-examiner Prof. Dr. Tim Roughgarden, Stanford University, co-examiner 2008 Abstract Peer-to-peer (p2p) computing is one of the most intriguing new network- ing paradigms of the last ten years, and many applications today use peer-to- peer technology, e.g. for large distributed computations, for file sharing, or for live media streaming. At the heart of the paradigm lies the idea of lever- aging the resources of the system's participants. Thus, potentially scalable and robust architectures can be built. However, making use of the decentralized resources is challenging. The peers are under the control of the individual users who may only connect to the network for a short period of time. Consequently, there are frequent mem- bership changes and p2p systems are highly dynamic. In addition to regular joins and leaves, the participating machines (often unreliable desktops) may crash. Peer-to-peer solutions are also faced with the fact that it is not always in the (anonymous) users' interest to contribute their resources. Rather, a user may be selfish and seek to exploit the system without reciprocating. This dissertation studies the challenges of the dynamics in p2p computing and of cooperation. We describe a system which is based on a hypercubic topology and which applies algorithms that maintain desirable network prop- erties despite worst-case joins and leaves; these algorithms can also be used for pancake graphs. Besides membership dynamics, we investigate dynamic changes of the available bandwidth between two peers, and we analyze the throughput of different transfer protocols. In order to emphasize the impor- tance of the cooperation challenge, we conduct a case study of BitTorrent| one of the most traffic intensive applications on the Internet|, and show that today's peer-to-peer networks still fail to fend off uncooperative peers. A game-theoretic analysis of a p2p network creation game is presented which estimates the impact of selfish behavior. We find that both the performance and the stability of a system can suffer severely. In addition, this dissertation introduces a mathematical framework which allows us to evaluate a system's robustness to malicious attacks; the framework is also useful for the analysis of social networks. The theoretic findings are complemented by a case study which identifies vulnerabilities in the popular Kad network. Zusammenfassung Peer-to-peer Computing ist eines der faszinierensten Paradigmen im Net- working Bereich des letzten Jahrzehnts. Bereits gibt es zahlreiche Anwen- dungen, beispielsweise die Berechnung schwieriger mathematischer Probleme, der Austausch grosser Dateien oder live Ubertragungen¨ von Sportveranstal- tungen. Dem Paradigma liegt die Idee zugrunde, dass durch Ausnutzung der Resourcen der teilnehmenden Rechner potentiell skalierbare und robuste Architekturen m¨oglich werden. Die Abh¨angigkeit von den dezentralen Resourcen der Teilnehmer bringt aber auch gewisse Schwierigkeiten mit sich. Benutzer verbinden sich oft nur f¨urkurze Zeit zum Netzwerk, weshalb das System oft sehr dynamisch ist. Meist sind die beteiligten Maschinen auch unzuverl¨assigund k¨onnenjederzeit ausfallen. Des weiteren ist es h¨aufignicht im Interesse eines (anonymen) Benutzers, selber Resourcen zum System beizutragen. Diese Dissertation befasst sich mit den Herausforderungen, die sich aus der Dynamik und aus der Notwendigkeit zur Kooperation ergeben. Insbeson- dere werden wir ein auf einem Hyperw¨urfelbasierendes System vorstellen, das trotz ununterbrochenen und schlimmstm¨oglichen Topologie¨anderungen n¨utzliche Eigenschaften sicherstellt. Unsere Algorithmen k¨onnenauch auf andere Topologien angewandt werden, beispielsweise auf Pancake Graphen. Neben der sogenannten Knotendynamik betrachten wir auch dynamische Anderungen¨ der verf¨ugbarenBandbreite zwischen zwei Peers und analysieren die Effizienz verschiedener Ubertragungsprotokolle.¨ Unsere Fallstudie in Bit- Torrent { eine der beliebtesten Anwendungen im Internet { zeigt auf, dass heutige peer-to-peer Systeme noch keine wirksamen Mechanismen gegen un- kooperatives Verhalten anwenden. Mittels einer spieltheoretische Analyse der Topologien unstrukturierter peer-to-peer Netzwerke kommen wir zum Schluss, dass ein strategisches Verhalten aber einen wesentlichen Einfluss auf die Effizienz eines Systems haben kann. Diese Arbeit f¨uhrtausserdem einen mathematischen Formalismus ein, der es erm¨oglicht, den potentiellen Schaden durch b¨oswilligeTeilnehmer abzusch¨atzen; dieser Formalismus ist auch bei der Analyse von sozialen Netzwerken einsetzbar. Die theoretischen Erkenntnisse werden erg¨anztdurch ein Fallbeispiel, welches Schwachstellen in Kad, einem popul¨arenpeer-to-peer Netzwerk, identifiziert. Acknowledgements Many people have contributed to this dissertation. First of all, I am grateful to my advisor Roger Wattenhofer for his support, and for giving me the opportunity to pursue a number of different and exciting projects during my PhD time. I benefitted from his excellent knowledge|and critical view|of past and current developments in the field, and I feel lucky that the European Space Agency chose another candidate three years ago! I am honored that two well-known researchers, Boaz Patt-Shamir and Tim Roughgarden, agreed to read through my dissertation and to serve on my committee board. I would like to acknowledge their work and thank for their comments which helped to improve the thesis. Parts of this thesis have been presented on various occasions. I am obliged to the following people for their invitations and their feedback: Aaron Zollinger (UC Berkeley), David Parkes (Harvard University), Bobby Klein- berg and Emin G¨unSirer (Cornell University), Stephan Eidenbenz (Los Alamos National Laboratories), and Christian Scheideler (TU M¨unchen). In particular, I would like to thank Sven Kosub for pointing me to [233]. Many thanks go to my colleagues in the Distributed Computing Group. First of all, I would like to thank Roland Flury for having been a super office mate|and Zurich marathon competitor! I am grateful for the generous help he offered on so many occasions, and I will never forget the SOLA Duo race. Special thanks go to Fabian Kuhn, who was my diploma thesis advisor; his marvelous way of tackling problems and his enthusiasm was certainly a mo- tivation for me to continue my studies as a PhD student. I thank Thomas Moscibroda for the fruitful collaboration which broadened my scientific hori- zon, for having been a pleasant Discrete Event Systems co-assistant, and for his sense of humor in various situations. Thanks also go to my|without loss of generosity!|most productive peer-to-peer collaborator Thomas \T.Lo." Locher for having been an arch-accomplice in stealing bits, for the Happy Times with time-shifted subtitles, and for making the publications he co- authored a pleasure to read. I thank Yvonne Anne Oswald for her interest in Al Capone, the families, Gaussian ski rental on trees|and Suannai, for hav- ing been a great traveling companion in Australia, China, Japan|and MMP, and for challenging the all-time science quiz record on the plane to Bangkok. I also thank Remo Meier for making Pulsar better than the SIGCOMM re- viewers were prepared to and for inviting me to the \Kanonenrohr Piste", Michael Kuhn for challenging discrete logarithm cryptography not only at the university of Berne and for the diligent use of the \rote Telefon", Pascal von Rickenbach for sorting out the Highway to Hell problem with me and for shedding light on the mysteries of the Piazza del Popolo, Aaron Zollinger for introducing me to the YMCA in Berkeley|and to a popular web search company, Keno Albrecht for the computer support and for the time2climb in the Gaswerk, Nicholas Burri for having been the only T¨oggelipartner with whom I could improve my ranking, Olga Goussevskaia for telling me when to \eat!" the opponent's queen at the TIK institute's (chess) summer fight, and Johannes Schneider for organizing, among many others things, the Indian Ooty trip and the Swiss 3 a.m./4190 m.a.s.l. Strahlhorn expedition. I would also like to thank the following former and new DCG members, office mates, people from the institute, collaborators, visitors, etc.: Andi Wetzel, Beat Futterknecht, Bernard Mans, Carmine Ventre, Caterina Sposato, Christoph Lenzen, Jin Li, Lino Sevcik, Marco Cicolini, Mario Strasser, Martin May, Miriam Fritz, Mirjam Wattenhofer, Monica Fricker, Philipp Sommer, Rainer Baumann, Regina O'Dell, Reto Sp¨ohel,Roland Mathis, Simon Heimlicher, Simon Schlachter, Thierry Dussuet, Thomas Steingruber, Uri Nadav, and Yves Weber. A number of student projects have been conducted in the context of this dissertation. It is great that (so far) four students, Raphael Eiden- benz, Thomas Locher, Remo Meier, and Yvonne Anne Oswald, have decided to start a PhD in our group as well. Moreover, it was interesting to wit- ness how Dominik Grolimund and Luzius Meisser's Kangoo/Wuala system evolved from a student project into a business plan. I wish the two of them an exciting future! Special thanks go to Joest Smit for his appetite for
Recommended publications
  • Conducting and Optimizing Eclipse Attacks in the Kad Peer-To-Peer Network
    Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network Michael Kohnen, Mike Leske, and Erwin P. Rathgeb University of Duisburg-Essen, Institute for Experimental Mathematics, Ellernstr. 29, 45326 Essen [email protected], [email protected], [email protected] Abstract. The Kad network is a structured P2P network used for file sharing. Research has proved that Sybil and Eclipse attacks have been possible in it until recently. However, the past attacks are prohibited by newly implemented secu- rity measures in the client applications. We present a new attack concept which overcomes the countermeasures and prove its practicability. Furthermore, we analyze the efficiency of our concept and identify the minimally required re- sources. Keywords: P2P security, Sybil attack, Eclipse attack, Kad. 1 Introduction and Related Work P2P networks form an overlay on top of the internet infrastructure. Nodes in a P2P network interact directly with each other, i.e., no central entity is required (at least in case of structured P2P networks). P2P networks have become increasingly popular mainly because file sharing networks use P2P technology. Several studies have shown that P2P traffic is responsible for a large share of the total internet traffic [1, 2]. While file sharing probably accounts for the largest part of the P2P traffic share, also other P2P applications exist which are widely used, e.g., Skype [3] for VoIP or Joost [4] for IPTV. The P2P paradigm is becoming more and more accepted also for professional and commercial applications (e.g., Microsoft Groove [5]), and therefore, P2P technology is one of the key components of the next generation internet.
    [Show full text]
  • PSP-Auto: a DHT-Based Data Storage and Retrieval System for Automation
    PSP-Auto: A DHT-based Data Storage and Retrieval System for Automation Jan Skodzik, Peter Danielis, Vlado Altmann, Eike Bjoern Schweissguth, Dirk Timmermann University of Rostock Institute of Applied Microelectronics and Computer Engineering 18051 Rostock, Germany, Tel./Fax: +49 381 498-7284 / -1187251 Email: [email protected] Abstract—In the field of automation, reliability is a key aspect which utilizes volatile rather than rarely available persistent to enable resilient systems. Especially, in areas with extreme memory as miniature devices often have a low or no memory conditions a reliable monitoring is necessary such as factory, capacity anyway. In the preliminary works [3] and [4], it volcano, or laboratory monitoring. These are environments where devices could be stressed uncommonly high and thus more devices has already been shown that a distributed memory can be could fail in a shorter time period in the worst case. Centralized realized by means of the so-called Peer-to-Peer-based Storage monitoring systems, which work in real-time for security reasons, Platform (PSP). Thereby, network elements of an Internet contain a single point of failure in the form of a central control service provider in the access network were networked to store instance. Additionally, if the central instance fails no data is configuration data. As basis, the decentralized and structured available any more as the central instance usually works as the only data sink in the system. Furthermore, with an increasing P2P protocol Kad has been applied. However, the requirements number of devices this system does not scale well. As the number in automation environments are more demanding than in access of devices and their performance will prospectively increase, a networks as automation environments require tremendously new approach is necessary to handle these large-scale systems.
    [Show full text]
  • A Study of Peer-To-Peer Systems
    A Study of Peer-to-Peer Systems JIA, Lu A Thesis Submitted in Partial Fulfilment of the Requirements for the Degree of Master of Philosophy in Information Engineering The Chinese University of Hong Kong August 2009 Abstract of thesis entitled: A Study of Peer-to-Peer Systems Submitted by JIA, Lu for the degree of Master of Philosophy at The Chinese University of Hong Kong in June 2009 Peer-to-peer (P2P) systems have evolved rapidly and become immensely popular in Internet. Users in P2P systems can share resources with each other and in this way the server loading is reduced. P2P systems' good performance and scalability attract a lot of interest in the research community as well as in industry. Yet, P2P systems are very complicated systems. Building a P2P system requires carefully and repeatedly thinking and ex- amining architectural design issues. Instead of setting foot in all aspects of designing a P2P system, this thesis focuses on two things: analyzing reliability and performance of different tracker designs and studying a large-scale P2P file sharing system, Xun- lei. The "tracker" of a P2P system is used to lookup which peers hold (or partially hold) a given object. There are various designs for the tracker function, from a single-server tracker, to DHT- based (distributed hash table) serverless systems. In the first part of this thesis, we classify the different tracker designs, dis- cuss the different considerations for these designs, and provide simple models to evaluate the reliability of these designs. Xunlei is a new proprietary P2P file sharing protocol that has become very popular in China.
    [Show full text]
  • Emule Apk Free Download
    Emule apk free download Continue The app was created to work on ED2K (eDonkey2000 protocol) networks, right on your mobile device! it's not a remote control. Disclaimer: We are not affiliated with the eMule project. Mule for Android provides basic functionality: search for files on servers, download files, share files. You can watch videos while downloading files using the preview feature. The use is simple: when you first start, select an incoming directory; Then, search for files and download them. Buy a paid version if you want to remove ads. Kademlia's initial support is here!. Search sources and keywords are available now. When you first start KAD, you need a download site (IP/port) or a node.dat file at your download location. You can download nodes.dat directly from the mule - click the download button on the preference page to the right of the KAD switch. Check the KAD status with the information button - when YOU work KAD you will see not an empty KAD table. Let me know if you have a problem. It's not a remote control. Disclaimer: We are not affiliated with the eMule project. Mule for Android provides the main features available: search for files on servers, download files, file sharing. You can watch videos when you download files with a preview feature. The use is simple: when you first start, select the input directory; then look for the files and download them. Buy the full version if you want to remove the ads. Kademlia's initial support is here!. Search sources and keywords are now available.
    [Show full text]
  • Vasco Alexandre Maia Dos Santos Infraestrutura Segura E
    Departamento de Eletrónica, Universidade de Aveiro Telecomunicações e Informática 2016 Vasco Alexandre Infraestrutura Segura e Descentralizada para a Maia dos Santos Internet das Coisas Secure Decentralized Internet of Things Infrastructure Departamento de Eletrónica, Universidade de Aveiro Telecomunicações e Informática 2016 Vasco Alexandre Infraestrutura Segura e Descentralizada para a Maia dos Santos Internet das Coisas Secure Decentralized Internet of Things Infrastructure “The walls between art and engineering exist only in our minds” — Theo Jansen Departamento de Eletrónica, Universidade de Aveiro Telecomunicações e Informática 2016 Vasco Alexandre Infraestrutura Segura e Descentralizada para a Maia dos Santos Internet das Coisas Secure Decentralized Internet of Things Infrastructure Dissertação apresentada à Universidade de Aveiro para cumprimento dos re- quisitos necessários à obtenção do grau de Mestre em Engenharia de Com- putadores e Telemática, realizada sob a orientação científica do Doutor Diogo Nuno Pereira Gomes, Professor auxiliar do Departamento de Eletrónica, Te- lecomunicações e Informática da Universidade de Aveiro, e do Doutor João Paulo Silva Barraca, Professor auxiliar do Departamento de Eletrónica, Tele- comunicações e Informática da Universidade de Aveiro. o júri / the jury presidente / president Prof. Doutor André Ventura da Cruz Marnoto Zúquete professor auxiliar da Universidade de Aveiro vogais / examiners committee Prof. Doutora Ana Cristina Costa Aguiar professora auxiliar convidada da Faculdade de Engenharia da Universidade do Porto Prof. Doutor Diogo Nuno Pereira Gomes professor auxiliar da Universidade de Aveiro (orientador) agradecimentos / Gostava de agradecer, em primeiro lugar ao Professor Doutor Diogo Gomes acknowledgements e ao Professor Doutor João Paulo Barraca pela oportunidade de integrar o ATNOG e trabalhar nesta dissertação, bem como por todo o apoio dado ao longo do mestrado.
    [Show full text]
  • A Blockchain System Based on Quantum-Resistant Digital Signature
    Hindawi Security and Communication Networks Volume 2021, Article ID 6671648, 13 pages https://doi.org/10.1155/2021/6671648 Research Article A Blockchain System Based on Quantum-Resistant Digital Signature Peijun Zhang ,1 Lianhai Wang ,1 Wei Wang ,1 Kunlun Fu ,1 and Jinpeng Wang 2 1Qilu University of Technology (Shandong Academy of Sciences), Shandong Provincial Key Laboratory of Computer Networks, Shandong Computer Science Center (National Supercomputer Center in Jinan), Jinan 250014, China 2Shandong Computer Science Center (National Supercomputer Center in Jinan), Jinan 250014, China Correspondence should be addressed to Lianhai Wang; [email protected] Received 17 December 2020; Revised 23 January 2021; Accepted 1 February 2021; Published 4 March 2021 Academic Editor: Debiao He Copyright © 2021 Peijun Zhang et al. ,is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Blockchain, which has a distributed structure, has been widely used in many areas. Especially in the area of smart cities, blockchain technology shows great potential. ,e security issues of blockchain affect the construction of smart cities to varying degrees. With the rapid development of quantum computation, elliptic curves cryptosystems used in blockchain are not secure enough. ,is paper presents a blockchain system based on lattice cipher, which can resist the attack of quantum computation. ,e most challenge is that the size of public keys and signatures used by lattice cryptosystems is typically very large. As a result, each block in a blockchain can only accommodate a small number of transactions.
    [Show full text]
  • Decentralized Location-Aware Orchestration of Containerized Microservice Applications
    DOCTORAL T H E SIS Lara Lorna Jiménez Decentralized Location-aware Orchestration of Containerized Microservice Applications of Containerized Orchestration Microservice Lara Lorna Jiménez Decentralized Location-aware Department of Computer Science and Electrical Engineering Division of Computer Science ISSN 1402-1544 Decentralized Location-aware ISBN 978-91-7790-617-9 (print) ISBN 978-91-7790-618-6 (pdf) Orchestration of Containerized Luleå University of Technology 2020 Microservice Applications Enabling Distributed Intelligence at the Edge Lara Lorna Jiménez Pervasive and Mobile Computing Decentralized Location-aware Orchestration of Containerized Microservice Applications Enabling Distributed Intelligence at the Edge Lara Lorna Jiménez Luleå University of Technology Department of of Computer Science and Electrical Engineering Division of Computer Science Printed by Luleå University of Technology, Graphic Production 2020 ISSN 1402-1544 ISBN 978-91-7790-617-9 (print) ISBN 978-91-7790-618-6 (pdf) Luleå 2020 www.ltu.se Decentralized Location-aware Orchestration of Containerized Microservice Applications Enabling Distributed Intelligence at the Edge Lara Lorna Jim´enez Dept. of Computer Science and Electrical Engineering Lule˚aUniversity of Technology Sweden Supervisors: Olov Schel´enand K˚areSynnes ii To my parents iii iv Abstract Services that operate on public, private, or hybrid clouds, should always be available and reachable to their end-users or clients. However, a shift in the demand for current and future services has led to new requirements on network infrastructure, service orches- tration, and Quality-of-Service (QoS). Services related to, for example, online-gaming, video-streaming, smart cities, smart homes, connected cars, or other Internet-of-Things (IoT) powered use cases are data-intensive and often have real-time and locality require- ments.
    [Show full text]
  • Searching for Malware in Bittorrent∗
    Searching for Malware in BitTorrent∗ Andrew D. Berns and Eunjin (EJ) Jung April 24, 2008 Abstract One of the most widely publicized aspects of computer security has been the presence and propagation of malware. Malware has adapted to many different changing technologies, in- cluding recently-popular P2P systems. While previous work has examined P2P networks and protocols like KaZaA and Gnutella for malware, little has been done so far that examines BitTor- rent. This project explored BitTorrent for the presence of malware, and discovered a significant portion of malware in the downloaded file set. Statistics on torrents infected with malware were gathered and analyzed to find patterns that are helpful in creating basic filtering heuristics. While these heuristics may work in simple cases, several easy ways they can be defeated were found. 1 Introduction Recently, peer-to-peer networks have emerged as a popular paradigm for Internet applications. In fact, a study in 2005 estimated that P2P traffic accounted for around 70% of all traffic on the Internet [2]. P2P technology is finding new applications as it grows, including voice-over-IP systems and streaming video delivery. While P2P has found several different uses, perhaps the most widely-known use is for file sharing. One concern with P2P file sharing is that it can be used to distribute malware (malicious software, such as worms, viruses, and rootkits). On the one hand, users have access to huge amounts of data, while on the other hand, this data can easily be tainted with viruses, worms, and other forms of malware. An important consideration, then, is if the concern about malware in P2P networks is warranted, and if it is, are there ways to protect a computer and minimize the risk of malware infection from P2P networks.
    [Show full text]
  • Is Content Publishing in Bittorrent Altruistic Or Profit-Driven
    Is Content Publishing in BitTorrent Altruistic or Profit-Driven? Ruben Cuevas Michal Kryczka Angel Cuevas Univ. Carlos III de Madrid Institute IMDEA Networks and Univ. Carlos III de Madrid [email protected] Univ. Carlos III de Madrid [email protected] [email protected] Sebastian Kaune Carmen Guerrero Reza Rejaie TU Darmstadt Univ. Carlos III de Madrid University of Oregon [email protected] [email protected] [email protected] ABSTRACT ity [9, 15, 12] and improving its performance [18, 14]. BitTorrent is the most popular P2P content delivery appli- Moreover, some few papers have analyzed the demo- cation where individual users share various type of content graphics of BitTorrent [21, 11, 19] and also the secu- with tens of thousands of other users. The growing popular- rity [20] and privacy issues [6, 7]. However, the socio- ity of BitTorrent is primarily due to the availability of valu- economic aspects associated to BitTorrent in particular, able content without any cost for the consumers. However, and to other P2P file sharing systems in general, have apart from required resources, publishing (sharing) valuable received little attention despite of the importance that (and often copyrighted) content has serious legal implica- they have to the complete understanding of such kind of tions for user who publish the material (or publishers). This applications. This paper is a first step in this direction. raises a question that whether (at least major) content pub- The availability of free popular (often copyrighted) lishers behave in an altruistic fashion or have other incen- content that is of interest to millions of people (e.g.
    [Show full text]
  • Detecting Pedophile Activity in Bittorrent Networks
    Detecting Pedophile Activity in BitTorrent Networks Moshe Rutgaizer, Yuval Shavitt, Omer Vertman, and Noa Zilberman School of Electrical Engineering, Tel-Aviv University, Israel Abstract. The wide spread of Peer-to-Peer networks makes multime- dia files available to users all around the world. However, Peer-to-Peer networks are often used to spread illegal material, while keeping the source of the data and the acquiring users anonymous. In this paper we analyze activity measurements in the BitTorrent network and examine child sex abuse activity through the Mininova web portal. We detect and characterize pedophilic material in the network, and also analyze differ- ent aspects of the abusers activity. We hope our results will help law enforcement teams detecting child molesters and tracking them down earlier. 1 Introduction Peer-to-peer networks are being widely used around the world by millions of users for sharing content. The anonymity provided by these networks makes them prone to sharing illegal contents, from simple copyright protected material to highly dangerous material, as will be discussed next. The BitTorrent file sharing network was responsible for 27% to 55% of in- ternet traffic (depending on geographic location) in 2009 [13]. The BitTorrent protocol allows to download large files without loading a single source computer, rather the downloading users join a group of hosts that download and upload from each other, simultaneously. Every BitTorrent file is uniquely defined by a descriptor file called a torrent, which is distributed via email or http websites. This torrent file allows the downloading and uploading users, called leechers and seeders, to share the content file.
    [Show full text]
  • A Torrent of Copyright Infringement? Liability for Bittorrent File-Sharers and File-Sharing Facilitators Under Current and Proposed Canadian Copyright Law
    A Torrent of Copyright Infringement? Liability for BitTorrent File-Sharers and File-Sharing Facilitators Under Current and Proposed Canadian Copyright Law Allen Mendelsohn Faculty of Law McGill University Montreal August 2010 A thesis submitted to McGill University in partial fulfillment of the requirements of the degree of Master of Laws (LL.M.) © Allen Mendelsohn 2010 ABSTRACT [Le résumé français suit l'anglais.] BitTorrent has become the primary means to share large files (movies, television shows, and music) over the internet. Canadian copyright law and jurisprudence have not kept pace with technology, and as a result there is no definitive pronouncement on the liability for copyright infringement of BitTorrent file- sharers, i.e. users, and file-sharing facilitators, i.e. Internet Service Providers (ISPs) and torrent search engines. Extrapolating from existing law and Canadian and foreign jurisprudence, I conclude that: (i) BitTorrent file-sharers are liable although there may be situations where fair dealing could apply; (ii) it may be possible to show ISPs are liable based on certain findings of fact; and (iii) torrent search engines should not be liable for infringement. There have been three successive attempts to reform copyright law that have addressed internet issues generally and file-sharing in particular. Under the most recent attempt, Bill C-32, file-sharers would be liable under the new ―making available‖ right, and file- sharing facilitators could be liable under the new ―enabling‖ concept of secondary infringement introduced with the bill. RÉSUMÉ BitTorrent est devenu le principal moyen de partager des fichiers volumineux (films, émissions de télévision et musique) sur Internet.
    [Show full text]
  • Download-Emule-Kad-Server-List.Pdf
    Download Emule Kad Server List Download Emule Kad Server List 1 / 3 2 / 3 web site page displaying list of all active servers on the eDonkey/eMule p2p network. ... ping test update servers list at client start download list in eMule.. 0.50a installed on my computer. I can connect to eD2K network easily but I can't connect to Kad network. I have tried to download from http://www.nodes-dat.com/ but the first button " Add to eMule (from Nodes Server)" did't work and the other two worked but the problem still remains.. Bezpieczna lista serwerów emule do pobrania. Pobierz listę zawsze aktualną. Download server.met & serverlist for eMule.. eMule now connects to both the eDonkey network and the Kad network. ... eMule will use clients it knows already from the ed2k servers to get connected to Kad .... The servers merely help hold the network together. Meanwhile, Kad is a network that is also connectable via eMule. Unlike the ED2K network, ... You can use the easy to use installer or you can download the binaries. The difference is that the .... nodes.dat nodes for emule kademlia net server edonkey overnet. ... von IP/Port im Kad-Fenster, oder. - per Download aus dem Internent, z.B. nodes.dat.. Connecting to servers hasn't been working for a long time. ... started them again (there is free drive space on the download drive) but can't get a Kad connection. ... Block4: ipfilter.dat, nodes.dat, server.met (emule-security.org). Dodaj do #eMule te 2 pliki : Do serwerów, czyli eD2k --- http://www.server-list.info/ Do Kad ---..
    [Show full text]