02.01.2013 Views

Internet Protocol - Research by Kirils Solovjovs

Internet Protocol - Research by Kirils Solovjovs

Internet Protocol - Research by Kirils Solovjovs

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Skype protocol 81<br />

• L. De Cicco, S. Mascolo, V. Palmisano (December 9–11, 2008). "A Mathematical Model of the Skype VoIP<br />

Congestion Control Algorithm." (http:/ / c3lab. poliba. it/ images/ 2/ 22/ Skype_voip_model. pdf). Proc. of IEEE<br />

Conference on Decision and Control 2008.<br />

• Dario Bonfiglio, Marco Melia, Michela Meo, Dario Rossi, Paolo Tofanelli (August 27–31, 2007). "Revealing<br />

Skype Traffic: When Randomness Plays With You" (https:/ / www. dpacket. org/ articles/<br />

revealing-skype-traffic-when-randomness-plays-you). ACM SIGCOMM Computer Communication Review.<br />

External links<br />

• Repository of articles on Skype analysis (http:/ / www1. cs. columbia. edu/ ~salman/ skype/ )<br />

BitTorrent<br />

BitTorrent is a protocol that underpins the practice of peer-to-peer file sharing and is used for distributing large<br />

amounts of data over the <strong>Internet</strong>. BitTorrent is one of the most common protocols for transferring large files and it<br />

has been estimated that, collectively, peer-to-peer networks have accounted for approximately 43% to 70% of all<br />

<strong>Internet</strong> traffic (depending on geographical location) as of February 2009. [1]<br />

Programmer Bram Cohen designed the protocol in April 2001 and released the first available version on July 2,<br />

2001. [2] Currently, numerous BitTorrent clients are available for a variety of computing platforms.<br />

As of January 2012, BitTorrent is utilized <strong>by</strong> 150 million active users (according to BitTorrent, Inc.). Based on this<br />

figure, the total number of monthly BitTorrent users can be estimated at more than a quarter of a billion. [3] At any<br />

given instant, BitTorrent has, on average, more active users than YouTube and Facebook combined (this refers to the<br />

number of active users at any instant and not to the total number of unique users). [4][5] <strong>Research</strong> has also shown that,<br />

since 2010, more than 200,000 users of the protocol have been sued. [6]<br />

Description<br />

The BitTorrent protocol can be used to reduce the server and network impact of distributing large files. Rather than<br />

downloading a file from a single source server, the BitTorrent protocol allows users to join a "swarm" of hosts to<br />

download and upload from each other simultaneously. The protocol is an alternative to the older single source,<br />

multiple mirror sources technique for distributing data, and can work over networks with lower bandwidth so many<br />

small computers, like mobile phones, are able to efficiently distribute files to many recipients.<br />

A user who wants to upload a file first creates a small torrent descriptor file that they distribute <strong>by</strong> conventional<br />

means (web, email, etc.). They then make the file itself available through a BitTorrent node acting as a seed. Those<br />

with the torrent descriptor file can give it to their own BitTorrent nodes which, acting as peers or leechers, download<br />

it <strong>by</strong> connecting to the seed and/or other peers.<br />

The file being distributed is divided into segments called pieces. As each peer receives a new piece of the file it<br />

becomes a source (of that piece) for other peers, relieving the original seed from having to send that piece to every<br />

computer or user wishing a copy. With BitTorrent, the task of distributing the file is shared <strong>by</strong> those who want it; it<br />

is entirely possible for the seed to send only a single copy of the file itself and eventually distribute to an unlimited<br />

number of peers.<br />

Each piece is protected <strong>by</strong> a cryptographic hash contained in the torrent descriptor. [7] This ensures that any<br />

modification of the piece can be reliably detected, and thus prevents both accidental and malicious modifications of<br />

any of the pieces received at other nodes. If a node starts with an authentic copy of the torrent descriptor, it can<br />

verify the authenticity of the entire file it receives.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!