P2P Strategies for the Safe Distribution of Rich Media Content

Total Page:16

File Type:pdf, Size:1020Kb

P2P Strategies for the Safe Distribution of Rich Media Content P2P Strategies for the Safe Distribution of Rich Media Content by Helder Fernandes de Castro Dissertation submitted to the Faculty of Engineering of the University of Porto for the degree of Doctor of Philosophy in the Doctoral Program in Electrical and Computers Engineering Supervisor Artur Pimenta Alves (PhD), Co-Supervisor Maria Teresa Andrade (PhD) 2012 iii Abstract The production, distribution, and consumption of information goods have faced various challenges over the years. Currently, the status-quo in this field is being shaken by the emergence of the Internet as the prime ground for information exchange. This powerful new information distribution medium, is very attractive for consumers, who find it much more comfortable. It is also appealing for distributors as it enables a near costless replication and distribution of information commodities. If the on-line medium is combined with P2P distribution, such costs are decreased even further. However, this near annulment of the mentioned costs, by the Internet, has enabled an explosion of free content exchange. Content scarcity has thus been virtually eliminated in the on-line environment, and is thus challenging age-old intellectual-property regimes Commercial players have begun adopting all-digital on-line distribution and P2P distribution technologies, inscribed within operations that are characterized by Business Models (BMs) which have simply been transposed from the “real world” onto the on-line environment. These BMs are, typically, very dependent on the scarcity of the delivered content, thus, to make up for its natural loss, in the on-line medium, said BMs generally require the employment of access restricting Digital Rights Management (DRM) technology to artificially recreate the lost scarcity. In spite of the potential of the Internet medium, attested by the successes of many information content distributing initiatives (legitimate or not), commercial initiatives have generally attained unremarkable results. DRM technologies have frequently been resented and circumvented by users and consequently abandoned by commercial players. P2P distribution technology has also been retreated from, in favour of more traditional ones. Finally, the overall obtained economic results have generally, been unimpressive. In this work, we set of to discover and identify the root causes of the lack of success of commercial online (specifically, P2P based) content distribution initiatives, and, of the associated, frequent failure of DRM (security) technologies. We discovered that such root causes are, fundamentally, not technical but mostly economic and are related to the enforcement of inadequate, information scarcity dependent BMs in a scarcity adverse environment. We then identified some BMs which we believe to be adequate for such an environment. The existing P2P content distribution tools, both in the commercial and non-commercial sectors, are either inadequate or suboptimal, to provide the necessary support for the identified BMs. We thus proceeded to conceive a P2P content distribution architecture, upon which such BMs can be securely implemented. v Resumo A produção, distribuição e consumo de bens informacionais têm enfrentado vários desafios ao longo dos tempos. Actualmente, o status-quo neste campo está a ser abalado pelo surgimento da Internet como o terreno privilegiado para a troca de informação. Este novo e poderoso meio de distribuição de informação, é muito atraente para os consumidores, que o consideram muito mais confortável que anteriores soluções. É atraente também para os distribuidores de conteúdos informacionais, pois permite uma enorme redução dos custos replicação e distribuição desses bens. Se o meio on-line for combinado com a distribuição P2P, esses custos são reduzidos ainda mais. No entanto, a quase anulação de custos permitida pela Internet, abriu caminho a um crescimento explosivo na troca livre de conteúdos media. A escassez (no sentido económico do termo), de conteúdo informacional, foi assim praticamente eliminada no ambiente on-line, o que coloca sérios desafios aos regimes de propriedade intelectual há muito estabelecidos. Vários operadores comerciais começaram já a adoptar a distribuição digital e on-line assim como tecnologias de distribuição P2P. Isto tem sido feito no contexto de operações comerciais caracterizadas por Modelos de Negócios (MNs), que foram simplesmente transpostos do "mundo real" para o ambiente on-line. Estes MNs são, normalmente, estritamente dependentes da escassez do conteúdo distribuído. Por essa razão, para compensar a perda natural dessa escassez no meio on-line, os referidos BMs requerem, tipicamente, o emprego de tecnologia de restrição de acesso ao conteúdo, para artificialmente recriar a escassez perdida. A tecnologia em questão é globalmente chamada de tecnologia de Digital Rights Management (DRM). Apesar do potencial do meio Internet, atestado pelos sucessos de variadas iniciativas (legítimas ou não), na área da distribuição livre de conteúdo informacional, as iniciativas de cariz comercial têm geralmente obtido resultados nada notáveis. As tecnologias de DRM têm-se revelado incómodas para os utilizadores e são frequentemente por eles contornadas. Consequentemente, isto tem resultado no seu abandono pelos operadores comerciais. O emprego de tecnologias P2P de distribuição tem também recuado, em favor de outras mais tradicionais. Por fim, os resultados económicos obtidos têm, em geral, sido inexpressivos. Neste trabalho, tratamos de investigar e identificar as causas da falta geral de sucesso das iniciativas comerciais de distribuição de conteúdo on-line, (com um enfoque especial naquelas que empregam distribuição P2P), assim como da falha frequente das tecnologias DRM associadas. Descobrimos que essas causas não são, fundamentalmente, de natureza técnica, mas principalmente económica e que estão relacionadas com o emprego de MNs desadequados por dependerem da preservação da escassez dos bens distribuídos num ambiente adverso a essa escassez. Em face do anterior, procedemos então à identificação de alguns MNs que acreditamos serem adequados para tal ambiente. As ferramentas, actualmente existentes, para a distribuição P2P de conteúdo, tanto no sector comercial como no não-comercial, são inadequadas ou insuficientes, para fornecer o suporte necessário para os MNs identificados. Para responder a essa necessidade, concebemos uma arquitectura P2P de distribuição de conteúdo, sobre o qual os MNs referidos podem ser implementados com segurança. vii Acknowledgements This Ph.D. study was undertaken in six years, starting in November 2006, within the context of the Ph.D. program in Electrical Engineering at the Faculdade de Engenharia da Universidade do Porto. It was supported by the Fundação para a Ciência e a Tecnologia (FCT), during four of those years, and hosted, for the entirety of that period, at INESC TEC under the supervision of professors Artur Pimenta Alves and Maria Teresa Andrade. I would hereby, like to express my appreciation to FCT, for their important financial support, and to INESC TEC for their welcoming attitude, for providing me with a workplace in a dynamic and fruitful research environment and for their understanding of the specific work conditionments under which a Ph.D. student is. I would especially like to thank professors Artur Pimenta Alves and Maria Teresa Andrade for their valuable and patient guidance and support throughout the course of these Ph.D. works. I sincerely thank, also, all the colleagues with whom I have worked and exchanged ideas, during this period, in the context of the elaboration of scientific papers and of my involvement in research projects. Collaborating with them has enabled me to acquire new skills and concepts and to achieve a better divulging of the work that I have developed throughout the Ph.D. Finally I thank my family, and friends, for their unconditional and ever-present support. ix Contents Abstract .............................................................................................................................. iii Resumo................................................................................................................................ v Acknowledgements .......................................................................................................... vii Contents ............................................................................................................................. ix List of Figures and Tables ................................................................................................ xv Symbols and Acronyms ................................................................................................. xvii I Introduction ............................................................................................................. 1 1 Context ...................................................................................................................... 1 2 Objectives ................................................................................................................. 1 3 Major Results ............................................................................................................ 1 4 Structure of the Dissertation ...................................................................................... 2 II P2P Content Delivery Survey ................................................................................. 5 1 Introduction ..............................................................................................................
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Heavy? You Must Be Crazy
    YOUR FREE WEEKDAY AFTERNOON SOURCE FOR NEWS, SPORTS AND ENTERTAINMENT 03 27 2008 Heavy? You must be crazy Sporting a belly at 40 seriously increases your chances of getting Alzheimer’s later. p.10 Look whom John McCain brought to Utah. p.4 Huge bills freak out Questar customers. p.4 All-you-can-eat seats for sports fan. p.14 SOMETHING TO BUZZ ABOUT Bartender, Another Hemotoxin Please Murder Suspect Not a Flight Risk A Texas rattlesnake rancher found Popplewell said his intent is not A morbidly obese Texas woman Mayra Lizbeth Rosales, who a new way to make money: Stick a to sell an alcoholic beverage but a who authorities originally thought weighs at least 800 pounds and is rattler inside a bottle of vodka and healing tonic. He said he uses the might have crushed her 2-year-old bedridden, was photographed and market the concoction as an “an- cheapest vodka he can find as a nephew to death was arraigned in fingerprinted at her La Joya home cient Asian elixir.” But Bayou Bob preservative for the snakes. The her bedroom Wednesday on a cap- before being released on a per- Popplewell has no liquor license and end result is a super sweet mixed ital murder charge, accused of strik- sonal recognizance bond, Hidalgo faces charges. drink he compared to cough syrup. ing him in the head. County Sheriff Lupe Trevino said. 27mar08 TheWeather Tonight Partly cloudy. 29° theprimer Sunset: 7:47 p.m. Friday 50° Mostly cloudy; 50 INTERNET percent chance of late rain and snow An Educational, Saturday and Fruitful, Site 45° Mostly cloudy; 40 A colorful, new interactive Web site, percent chance of rain designed to educate children ages 2 and snow.
    [Show full text]
  • Summit Guide Guide Du Sommet Guía De La Cumbre Contents/Sommaire/Sumario
    New Frontiers for Creators in the Marketplace 9-10 June 2009 – Ronald Reagan Center – Washington DC, USA www.copyrightsummit.com Summit Guide Guide du Sommet Guía de la Cumbre Contents/Sommaire/Sumario Page Welcome 1 Conference Programme 3 What’s happening around the Summit? 11 Additional Summit Information 12 Page Bienvenue 14 Programme des conférences 15 Autres événements autour du sommet ? 24 Informations supplémentaires du sommet 25 Página Bienvenidos 27 Programa de las Conferencias 28 ¿Lo que pasa alrededor del conferencia? 38 Información sobre el conferencia 39 Page Sponsor & Advisory Committee Profiles 41 Partner Organization Profiles 44 Media Partner Profiles 49 Speaker Biographies 53 9-10 June 2009 – Ronald Reagan Center – Washington DC, USA New Frontiers for Creators in the Marketplace Welcome Welcome to the World Copyright Summit! Two years on from our hugely successful inaugural event in Brussels it gives me great pleasure to welcome you all to the 2009 World Copyright Summit in Washington, DC. This year’s slogan for the Summit – “New Frontiers for Creators in the Marketplace” – illustrates perfectly what we aim to achieve here: remind to the world that creators’ contributions are fundamental for cultural, economic and social development but also that creators – and those who represent them – face several daunting challenges in this new digital economy. It is imperative that we bring to the forefront of political debate the creative industries’ future and where we, creators, fit into this new landscape. For this reason we have gathered, under the CISAC umbrella, all the stakeholders involved one way or another in the creation, production and dissemination of creative works.
    [Show full text]
  • Forescout Counteract® Endpoint Support Compatibility Matrix Updated: October 2018
    ForeScout CounterACT® Endpoint Support Compatibility Matrix Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix 2 Table of Contents About Endpoint Support Compatibility ......................................................... 3 Operating Systems ....................................................................................... 3 Microsoft Windows (32 & 64 BIT Versions) ...................................................... 3 MAC OS X / MACOS ...................................................................................... 5 Linux .......................................................................................................... 6 Web Browsers .............................................................................................. 8 Microsoft Windows Applications ...................................................................... 9 Antivirus ................................................................................................. 9 Peer-to-Peer .......................................................................................... 25 Instant Messaging .................................................................................. 31 Anti-Spyware ......................................................................................... 34 Personal Firewall .................................................................................... 36 Hard Drive Encryption ............................................................................. 38 Cloud Sync ...........................................................................................
    [Show full text]
  • 01 Worlock Editech 2008
    Editech 2008 The European Digital Publishing Marketplace: An Overview David R Worlock Chief Research Fellow Outsell, Inc. [email protected] June 2008 © 2008 Outsell, Inc. All rights reserved. Slower Growth Ahead © 2008 Outsell, Inc. All rights reserved. 2 Search Surges Ahead of Information Industry 26.1% 25.1% 25.2% 24.8% 21.6% 22.5% 18.3% 9.0% 5.0% 4.3% 3.1% 3.1% 3.2% 3.4% 2004 2005 2006 2007 (P) 2008 (P) 2009 (P) 2010 (P) Search, Aggregation & Syndication Info Industry w/o SAS Source: Outsell’s Publishers & Information Providers Database © 2008 Outsell, Inc. All rights reserved. 3 Information Industry $380 Billion in 2007 9% 7% B2B Trade Publishing & Company Information 10% Credit & Financial Information 11% Education & Training HR Information Legal, Tax & Regulatory 5% 10% Market Research, Reports & Services IT & Telecom Research, 1% Reports & Services News Providers & Publishers 4% Scientific, Technical & Medical Information Search, Aggregation & 8% Syndication 1% Yellow Pages & Telephone 34% Directories Source: Outsell’s Publishers & Information Providers Database © 2008 Outsell, Inc. All rights reserved. 4 Search to Soar, While News Nosedives 2007-2010 Est. Industry Growth 5.5% Search, Aggregation & 22.7% Syndication HR Information 15.4% 9.5% IT & Telecom Research, Reports & Services 8.4% Credit & Financial Information 8.1% Market Research, Reports & Services 6.7% Scientific, Technical & Medical 6.7% Information Legal, Tax & Regulatory 5.8% B2B Trade Publishing & 5.7% Company Information Education & Training 5.2% -2.9% Yellow Pages & Directories Source: Outsell's Publishers & Information Providers Database News Providers & Publishers © 2008 Outsell, Inc. All rights reserved. 5 Global Growth in Asia and EMEA © 2008 Outsell, Inc.
    [Show full text]
  • Internet Peer-To-Peer File Sharing Policy Effective Date 8T20t2010
    Title: Internet Peer-to-Peer File Sharing Policy Policy Number 2010-002 TopicalArea: Security Document Type Program Policy Pages: 3 Effective Date 8t20t2010 POC for Changes Director, Office of Computing and Information Services (OCIS) Synopsis Establishes a Dalton State College-wide policy regarding copyright infringement. Overview The popularity of Internet peer-to-peer file sharing is often the source of network resource allocation problems and copyright infringement. Purpose This policy will define Internet peer-to-peer file sharing and state the policy of Dalton State College (DSC) on this issue. Scope The scope of this policy includes all DSC computing resources. Policy Internet peer-to-peer file sharing applications are frequently used to distribute copyrighted materials such as music, motion pictures, and computer software. Such exchanges are illegal and are not permifted on Dalton State Gollege computers or network. See the standards outlined in the Appropriate Use Policy. DSG Procedures and Sanctions Failure to comply with the appropriate use of these resources threatens the atmosphere for the sharing of information, the free exchange of ideas, and the secure environment for creating and maintaining information property, and subjects one to discipline. Any user of any DSC system found using lT resources for unethical and/or inappropriate practices has violated this policy and is subject to disciplinary proceedings including suspension of DSC privileges, expulsion from school, termination of employment and/or legal action as may be appropriate. Although all users of DSC's lT resources have an expectation of privacy, their right to privacy may be superseded by DSC's requirement to protect the integrity of its lT resources, the rights of all users and the property of DSC and the State.
    [Show full text]
  • OECD‘S Directorate for Science Technology and Industry
    THE ECONOMIC AND SOCIAL ROLE OF INTERNET INTERMEDIARIES APRIL 2010 2 FOREWORD FOREWORD This report is Part I of the larger project on Internet intermediaries. It develops a common definition and understanding of what Internet intermediaries are, of their economic function and economic models, of recent market developments, and discusses the economic and social uses that these actors satisfy. The overall goal of the horizontal report of the Committee for Information, Computer and Communications Policy (ICCP) is to obtain a comprehensive view of Internet intermediaries, their economic and social function, development and prospects, benefits and costs, and responsibilities. It corresponds to the item on 'Forging Partnerships for Advancing Policy Objectives for the Internet Economy' in the Committee‘s work programme. This report was prepared by Ms. Karine Perset of the OECD‘s Directorate for Science Technology and Industry. It was declassified by the ICCP Committee at its 59th Session in March 2010. It was originally issued under the code DSTI/ICCP(2009)9/FINAL. Issued under the responsibility of the Secretary-General of the OECD. The opinions expressed and arguments employed herein do not necessarily reflect the official views of the OECD member countries. ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the governments of 30 democracies work together to address the economic, social and environmental challenges of globalisation. The OECD is also at the forefront of efforts to understand and to help governments respond to new developments and concerns, such as corporate governance, the information economy and the challenges of an ageing population.
    [Show full text]
  • On the Superdistribution of Digital Goods
    On the Superdistribution of Digital Goods (Invited Paper) Andreas U. Schmidt Fraunhofer Institute for Secure Information Technology SIT Rheinstraße 75, 64295 Darmstadt, Germany Email: [email protected] Abstract— Business models involving buyers of digital goods or of p2p systems, and research on its fundamentals is still in the distribution process are called superdistribution schemes. scarce. For instance, basic economic questions pertaining to We review the state-of-the art of research and application of the viability of superdistribution in particular in competition superdistribution and propose systematic approach to market mechanisms using super-distribution and technical system archi- with free riders have only been examined in our previous tectures supporting it. The limiting conditions on such markets work [10]. The present paper presents a first contribution to are of economic, legal, technical, and psychological nature. a treatment of other characteristic issues of superdistribution ©2008 IEEE. Personal use of this material is permitted. How- systems, viewed as information systems in their application ever, permission to reprint/republish this material for advertising and economic context. A system model for generic superdis- or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any tribution is proposed in Section II, while Section III presents copyrighted component of this work in other works must be two concrete realisations with distinct traits. Section IV is obtained from the IEEE. the core part of the paper which collects the (in our view) most important research topics on superdistribution and tries I. INTRODUCTION to give an overview over the current state of knowledge in Information systems in general and the distribution of digital the area.
    [Show full text]
  • Music Labels Cut Friendlier Deals with Start-Ups
    New Flexibility at Music Labels Aims to Help Web Start-Ups Thrive - NYTimes.com Page 1 of 3 This copy is for your personal, noncommercial use only. You can order presentation-ready copies for distribution to your colleagues, clients or customers here or use the "Reprints" tool that appears next to any article. Visit www.nytreprints.com for samples and additional information. Order a reprint of this article now. May 28, 2009 Music Labels Cut Friendlier Deals With Start-Ups By BRAD STONE SAN FRANCISCO — With CD sales dropping fast, it is not hard to imagine how the major music labels could benefit from the growth of Web start-ups like Imeem. The company’s service lets people listen to songs, discover new artists and share their favorites with friends. And in return, Imeem owes the labels licensing fees for use of the music. But two months ago, Imeem’s founder, Dalton Caldwell, was ready to pull the plug. While 26 million people a month were using the service, Imeem owed millions of dollars to the music labels, and income from advertising was nowhere close to covering expenses. “It reached a point where it was not even clear it was worth doing any more,” Mr. Caldwell said. Then the ground shifted. This month, Warner Music Group forgave Imeem’s debt, and both Warner and Universal Music agreed to relax the terms of their licensing deals with the site. That allowed Imeem to raise more money from investors and plan for a profitable future. Imeem’s amnesty is one sign that a new accommodation is being forged between Web music start-ups and the companies on which they are almost wholly dependent, the major music labels.
    [Show full text]
  • The Copyright Crusade
    The Copyright Crusade Abstract During the winter and spring of 2001, the author, chief technology officer in Viant's media and entertainment practice, led an extensive inqUiry to assess the potential impact of extant Internet file-sharing capabilities on the business models of copyright owners and holders. During the course of this project he and his associates explored the tensions that exist or may soon exist among peer-to-peer start-ups, "pirates" and "hackers," intellectual property companies, established media channels, and unwitting consumers caught in the middle. This research report gives the context for the battleground that has emerged, and calls upon the players to consider new, productive solutions and business models that support profitable, legal access to intellectual property via digital media. by Andrew C Frank. eTO [email protected] Viant Media and Entertainment Reinhold Bel/tIer [email protected] Aaron Markham [email protected] assisted by Bmre Forest ~ VI ANT 1 Call to Arms Well before the Internet. it was known that PCs connected to two-way public networks posed a problem for copyright holders. The problem first came to light when the Software Publishers Association (now the Software & Information Industry Association), with the backing of Microsoft and others, took on computer Bulletin Board System (BBS) operators in the late 1980s for facilitating trade in copyrighted computer software, making examples of "sysops" (as system operators were then known) by assisting the FBI in orchestrat­ ing raids on their homes. and taking similar legal action against institutional piracy in high profile U.S. businesses and universities.' At the same time.
    [Show full text]
  • Content, Media & Entertainment
    Content, Media & Entertainment Chicago | Los Angeles | New York | Washington, DC Jenner & Block LLP jenner.com CONTENTS 2 ADVancED MEDIA | CONTENT PROTECTION 8 COpyRIGHT and ENTERTAInmENT LITIGATION 13 BUSINESS LITIGATION FOR ENTERTAINMENT SECTOR COMPANIES 17 IP TRanSacTIONS 18 COpyRIGHT POLIcy and COunSELING 21 ROyalTY and RaTE-SETTING LITIGATION 22 MEDIA AND FIRST AMENDMENT 25 TRADEMARK AND UNFAIR COMPETITION 27 PRIVacy and InfORmaTION GOVERnancE 29 OuR TEam ©2012 Jenner & Block LLP. Jenner & Block is an Illinois Limited Liability Partnership including professional corporations. This publication is not intended to provide legal advice but to provide information on legal matters. Transmission is not intended to create and receipt does not establish an attorney-client relationship. Readers should seek specific legal advice before taking any action with respect to matters mentioned in this publication. The attorney responsible for this publication is Steven B. Fabrizio. Attorney Advertising. Prior results do not guarantee a similar outcome. Content, Media & Entertainment Jenner & Block’s Content, Media & Entertainment practice unites a set of highly skilled and nationally known attorneys who use their legal experience and business savvy to help content providers A nationwide leader in succeed. Whether they are known as copyright lawyers, business helping content creators litigators, First Amendment advocates, IP transactional attorneys, trademark litigators, privacy attorneys, or something else, these safeguard their intellectual lawyers have one thing in common: They understand the highly complex and constantly changing challenges distinct to companies property on the internet and in the content, media and entertainment industries. in other advanced media The Content, Media & Entertainment practice and its attorneys are widely recognized as among the best in the country.
    [Show full text]
  • Ipoque Internet Study 2008/2009
    Internet Study 2008/2009 Hendrik Schulze, Klaus Mochalski For the third year in a row, after 2006 and 2007, ipoque has conducted a compre- hensive study measuring and analyzing Internet traffic in eight regions of the world. The study includes statistical data about popularity and user behavior for all common network protocols. This covers most applications used in today’s Internet such as Web browsing, media streaming, P2P file sharing, one-click file hosting, instant mes- saging, Internet telephony and online games. BitTorrent and eDonkey downloads have been analyzed to classify the transfered files according to their content type. Some of the key findings are: P2P still produces most Internet traffic worldwide al- though its proportion has declined across all monitored regions – loosing users to file hosting and media streaming; regional variations in application usage are very prominent; and Web traffic has made its comeback due to the popularity of file host- ing, social networking sites and the growing media richness of Web pages. Introduction What Is New? What Is Different? This study uses the same methodology as the 2007 Internet Key facts Study1 to classify network traffic according to protocol and protocol class. Several of ipoque’s ISP and university cus- • 8 regions: Northern Africa, Southern Africa, South tomers agreed to provide anonymized traffic statistics col- America, Middle East, Eastern Europe, Southern lected by PRX Traffic Managers installed in their networks. Europe, Southwestern Europe, Germany Protocols and applications are detected with a combination • 1.3 petabytes of user traffic monitored of layer-7 deep packet inspection (DPI) and behavioral • 1.1 million users represented traffic analysis.
    [Show full text]