The Kazaa Overlay

 The Kazaa Overlay Analysis Paper

The KaZaA Overlay: A Measurement Examine

Jian Liang

Department of Computer and

Information Technology,

Polytechnic University or college,

Brooklyn, NYC, USA 11201

Email: [email protected] poly. edu

Rakesh Kumar

Department of Electrical and

Computer Executive,

Polytechnic University or college,

Brooklyn, NEW YORK, USA 11201

Email: [email protected] poly. edu

Keith T. Ross

Division of Laptop and

Details Science,

Polytechnic University,

Brooklyn, NY, USA 11201

Email: [email protected] edu

September 12-15, 2004


Both in terms of quantity of participating users and in tra±c volume, KaZaA is one of the most important applications in the Internet today. However, because KaZaA is private and uses encryption, little is realized about KaZaA's overlay composition and mechanics, its messaging protocol, as well as index manage- ment. We have built two measurement device - the KaZaA Sni±ng Platform plus the KaZaA Prying Tool - to unravel many of the mysteries behind KaZaA. We deploy the apparatus to study KaZaA's overlay composition and dynamics, its neighbors selection, its use of active port numbers to circumvent ¯rewalls, and its index administration. Although this kind of study would not fully fix the KaZaA puzzle, that nevertheless leads to a logical description of KaZaA as well as overlay. Further- more, all of us leverage the measurement results to set forth a number of key concepts for the design of your successful unstructured P2P contribution. The way of measuring results and resulting style principles in this paper needs to be useful for long term architects of P2P overlay networks as well as for engineers managing ISPs. 1

1 Intro

On a standard day, KaZaA has more than 3 , 000, 000 active users sharing above 5, 1000 terabytes of content. Around the University of Washington campus network in June 2002, KaZaA consumed approximately 37% of all TCP tra±c, which has been more than 2 times the Web tra±c on the same grounds at the same time [8]. With over a few million satis¯ed users, KaZaA is signi¯cantly more popular than Napster or Gnutella ever before was. Sandvine estimates that in the US 76% of P2P ¯le sharing tra±c is definitely KaZaA/FastTrack tra±c and only 8% is Gnutella tra±c [23]. Obviously, both in terms of quantity of participating users and in tra±c volume, KaZaA is one of the most critical applications at any time carried by the Internet. Actually it can be contended that KaZaA has been so successful that any new proposal for a P2P ¯le sharing program should be in contrast to the KaZaA benchmark. However , largely because KaZaA can be described as proprietary protocol which codes its whistling messages, very little has been seen to date about the speci¯cs of KaZaA's overlay, the upkeep of the contribution, and the KaZaA signalling protocol. In this daily news we undertake a comprehensive measurement study of KaZaA's overlay structure and dynamics, the neighbor collection, its make use of dynamic interface numbers to circumvent ¯rewalls, and its index management. Although this research does not totally solve the KaZaA dilemna, it on the other hand leads to a coherent explanation of KaZaA and its overlay, while rendering many new observations about the main points of KaZaA. To unravel the insider secrets of the KaZaA overlay, we developed two measurement equipment: the KaZaA Sni±ng Program and the KaZaA Probing Device. The KaZaA Sni±ng System is a group of KaZaA nodes that are forced to interconnect in a con- trolled manner with one another, while one node is also connected to a huge selection of platform-external KaZaA nodes. The KaZaA Sni±ng Platform collects KaZaA sig- nalling tra±c, from which we could draw a conclusion about the structure and dynamics in the KaZaA contribution. The KaZaA Probing Tool establishes a TCP connection with any delivered KaZaA node, handshakes get back node, and sends and receives irrelavent encrypted KaZaA messages while using node. It is used for inspecting node availabilities and KaZaA neighbor variety. Both of these equipment consume limited resources. One of many contributions of this paper is to show how it is possible to obtain extensive overlay...

References: November, 2003.

[17] J. Kurose, K. W. Ross, Networking: A Top-Down Approach Offering

the Internet, " Addison-Wesley, 2006.

[19] M. Liang, L. Kumar, Sumado a. Xi, K. W. Ross, Pollution in P2P File Sharing Systems, "

submitted, 2004.

Supercomputing, New York City, NY, USA, June, 2002.

Internet Computer Journal, volume. 6, number 1, 2002.

Analysis of sites Content Delivery Systems, " Proceedings of the 5th Conference, seminar

on Systems Design and Implementation (OSDI 2002), Boston, MA, USA,


Human Resource Management Interventions: Career Planning and Creation, Workforce Variety, and Staff Stress and Wellness. Article

A STUDY ON Hrm interventions: profession planning and development, labor force diversity, and employee pressure and wellbeing. A Report published in partial fulfillment from the requirement…...

Introduction of ethical Eduction in Schools Dissertation

Residence > Judgment > Albhabets > What is needed in schools can be not meaning education nevertheless religious education What is required in universities is not moral education…...

Essay on Tartuffe

Dissertation #2: Tartuffe's Extreme Good manners and Settings Moliere's " Tartuffe” shows modes and manners of various characters throughout the comedy. A character that reveals a high extreme…...

Difference in Development: Fresh England as well as the Chesapeake Areas Essay

A large number of colonists, while British subject matter, contributed to the war efforts in 1755, against the People from france. During that time, the settlers came into exposure…...

Walking on the ocean Essay

Bible paper 1 . Intro Matthew 13: 22-33 (walking on the sea) has many important incites for a Christian. If the disciples 1st saw Jesus walking…...

Economics and Financial Preparing Skills Essay

Job 1: Financial Basics (24. 0 points) 1 . Explain two types of important things that financial planning skills may help you do, and explain how come…...