The Kazaa Overlay

 The Kazaa Overlay Analysis Paper

The KaZaA Overlay: A Measurement Examine

Jian Liang

Department of Computer and

Information Technology,

Polytechnic University or college,

Brooklyn, NYC, USA 11201

Email: [email protected] poly. edu

Rakesh Kumar

Department of Electrical and

Computer Executive,

Polytechnic University or college,

Brooklyn, NEW YORK, USA 11201

Email: [email protected] poly. edu

Keith T. Ross

Division of Laptop and

Details Science,

Polytechnic University,

Brooklyn, NY, USA 11201

Email: [email protected] edu

September 12-15, 2004

Fuzy

Both in terms of quantity of participating users and in tra±c volume, KaZaA is one of the most important applications in the Internet today. However, because KaZaA is private and uses encryption, little is realized about KaZaA's overlay composition and mechanics, its messaging protocol, as well as index manage- ment. We have built two measurement device - the KaZaA Sni±ng Platform plus the KaZaA Prying Tool - to unravel many of the mysteries behind KaZaA. We deploy the apparatus to study KaZaA's overlay composition and dynamics, its neighbors selection, its use of active port numbers to circumvent ¯rewalls, and its index administration. Although this kind of study would not fully fix the KaZaA puzzle, that nevertheless leads to a logical description of KaZaA as well as overlay. Further- more, all of us leverage the measurement results to set forth a number of key concepts for the design of your successful unstructured P2P contribution. The way of measuring results and resulting style principles in this paper needs to be useful for long term architects of P2P overlay networks as well as for engineers managing ISPs. 1

1 Intro

On a standard day, KaZaA has more than 3 , 000, 000 active users sharing above 5, 1000 terabytes of content. Around the University of Washington campus network in June 2002, KaZaA consumed approximately 37% of all TCP tra±c, which has been more than 2 times the Web tra±c on the same grounds at the same time [8]. With over a few million satis¯ed users, KaZaA is signi¯cantly more popular than Napster or Gnutella ever before was. Sandvine estimates that in the US 76% of P2P ¯le sharing tra±c is definitely KaZaA/FastTrack tra±c and only 8% is Gnutella tra±c [23]. Obviously, both in terms of quantity of participating users and in tra±c volume, KaZaA is one of the most critical applications at any time carried by the Internet. Actually it can be contended that KaZaA has been so successful that any new proposal for a P2P ¯le sharing program should be in contrast to the KaZaA benchmark. However , largely because KaZaA can be described as proprietary protocol which codes its whistling messages, very little has been seen to date about the speci¯cs of KaZaA's overlay, the upkeep of the contribution, and the KaZaA signalling protocol. In this daily news we undertake a comprehensive measurement study of KaZaA's overlay structure and dynamics, the neighbor collection, its make use of dynamic interface numbers to circumvent ¯rewalls, and its index management. Although this research does not totally solve the KaZaA dilemna, it on the other hand leads to a coherent explanation of KaZaA and its overlay, while rendering many new observations about the main points of KaZaA. To unravel the insider secrets of the KaZaA overlay, we developed two measurement equipment: the KaZaA Sni±ng Program and the KaZaA Probing Device. The KaZaA Sni±ng System is a group of KaZaA nodes that are forced to interconnect in a con- trolled manner with one another, while one node is also connected to a huge selection of platform-external KaZaA nodes. The KaZaA Sni±ng Platform collects KaZaA sig- nalling tra±c, from which we could draw a conclusion about the structure and dynamics in the KaZaA contribution. The KaZaA Probing Tool establishes a TCP connection with any delivered KaZaA node, handshakes get back node, and sends and receives irrelavent encrypted KaZaA messages while using node. It is used for inspecting node availabilities and KaZaA neighbor variety. Both of these equipment consume limited resources. One of many contributions of this paper is to show how it is possible to obtain extensive overlay...

References: November, 2003.

[17] J. Kurose, K. W. Ross, Networking: A Top-Down Approach Offering

the Internet, " Addison-Wesley, 2006.

[19] M. Liang, L. Kumar, Sumado a. Xi, K. W. Ross, Pollution in P2P File Sharing Systems, "

submitted, 2004.

Supercomputing, New York City, NY, USA, June, 2002.

Internet Computer Journal, volume. 6, number 1, 2002.

Analysis of sites Content Delivery Systems, " Proceedings of the 5th Conference, seminar

on Systems Design and Implementation (OSDI 2002), Boston, MA, USA,


Related

The Weak point and Strong points in Dubai Essay

Us and Them The short story " Us and Them" simply by David Sedaris shows different facets about the partnership between two families. Sedaris was pointing about…...

Children Find out Best simply by Observing Patterns of Addults and Burning It Composition

H61012A L9914234 Pham Minh Tu Discursive Eassay Children learn greatest by noticing behavior of addults and copying this The major variation between adults and children is…...

Bigraphy of Kamau Brathwaite Essay

Edward Kamau Brathwaite (born 11 May 1930, Bridgetown, Barbados) is widely deemed one of the major sounds in the Caribbean literary cannon.[1] A professor of Comparative Literature at New York University,[1]…...

CSEC June2011 EnglishB Ques6 Essay

British B SECTION B - POETRY Response ONE issue in this section. 6. Choose TWO poetry that you have researched, in which something…...