Scalable CP-nets modeling for BitTorrent protocol

Author(s):  
Jing Liu ◽  
Haibo Wu ◽  
Xinming Ye ◽  
Jun Li
Keyword(s):  
2010 ◽  
Vol 439-440 ◽  
pp. 859-864
Author(s):  
Ming Zhang ◽  
Jin Qiu Yang

In the past few years, there have been tremendous interest in the peer-to-peer(P2P) content delivery. This communication paradigm dramatically increases the traffic over inter-ISP links. In particular, BitTorrent(BT), the most popular P2P application, generates a huge amount of traffic on the Internet. BitTorrent’s performance is limited by the fact that typical internet users have much lower upload bandwidths than download bandwidths. This results in the overall average download speed of a BitTorrent-like file download system to be bottle-necked by the much lower upload capacity. We think about to utilize idle users’ spare upload capacity to largely improve the download speed beyond what can be achieved in a conventional BitTorrent network. In this paper, we design a system that is completely compatible with the already existing clients who conform to the BitTorrent protocol, at the same time, we analyze this system’s steady-state performance and present simulation results.


2011 ◽  
Vol 34 (1) ◽  
pp. 368-383 ◽  
Author(s):  
E. Costa-Montenegro ◽  
J.C. Burguillo-Rial ◽  
F. Gil-Castiñeira ◽  
F.J. González-Castaño

Author(s):  
Nenad Jovanovic ◽  
Milena Milosevic ◽  
Mladen Kovacev ◽  
Krsto Lazic ◽  
Nedeljko Babic
Keyword(s):  

2017 ◽  
Vol 14 (1) ◽  
pp. 197-218
Author(s):  
Algimantas Venckauskas ◽  
Vacius Jusas ◽  
Kęstutis Paulikas ◽  
Jevgenijus Toldinas

The BitTorrent Sync client application is the most progressive development in the BitTorrent family. Nevertheless, it can be used for the activities that draw the attention of the forensics invetigators. The BitTorrent Sync client application employs quite largely the encryption for sending data packages. The initiation of the activity is carried out in the plain text only. Therefore, we proposed the methodology that enables to capture the initiation step and to inform the forensics investigator, which then takes the reactive actions. The experiment was carried in two modes: 1) simulating of the use of the BitTorrent Sync application; 2) monitoring of real traffic on the Internet. During the monitoring, it is possible to calculate the public lookup SHA1 hash of the shared file. The comparison of the calculated hash with the list of publicly available hashes allows determination whether sharing of the file is legal or illegal. The presented methodology can be applied to any BitTorrent protocol.


2013 ◽  
Vol 7 (4) ◽  
pp. 449-487 ◽  
Author(s):  
Marios Charalambous ◽  
Constandinos X. Mavromoustakis ◽  
George C. Violaris ◽  
Muneer Bani Yassein

Sign in / Sign up

Export Citation Format

Share Document