Protocol Measurements in BitTorrent Environments

نویسنده

  • Răzvan Deaconescu
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BitTorrent File Sharing in Mobile Ad-hoc Networks∗

This paper presents an application of the Group-based Service Discovery Protocol (GSD) to implement the BitTorrent file sharing protocol on dynamically variable mobile ad-hoc network (MANET) environments. We used a so called ’trackerless’ extension of the BitTorrent to make our system more efficient on mobile P2P networks. Also we have implemented a discrete event simulator in Java language, to...

متن کامل

Using BitNBD for Provisioning Virtual Machines in OpenCirrus Testbed

BitTorrent is a convenient tool for downloading and distributing very large files. This feature throws us a clue if virtual machine images in distributed environments are possible to move from one site to another. Users also gain the ability to have their computer that follows them rather than be tied to one physical location. In this paper, we explore how the BitTorrent protocol can be applied...

متن کامل

Unveiling the BitTorrent Performance in Mobile WiMAX Networks

As mobile Internet environments are becoming widespread, how to revamp peer-to-peer (P2P) operations for mobile hosts is gaining more attention. In this paper, we carry out empirical measurement of BitTorrent users in a commercial WiMAX network. We investigate how handovers in WiMAX networks impact the BitTorrent performance, how BitTorrent peers perform from the aspects of connectivity, stabil...

متن کامل

DDoS Vulnerability Analysis of Bittorrent Protocol

Bittorrent (BT) traffic had been reported to contribute to 30% of the Internet traffic nowadays and the number of participants have been growing rapidly. For such a protocol that significantly involved in the Internet traffic, the robustness and security must be evaluated carefully. In this paper, we analyze the BT protocol and identify several potential vulnerabilities available for malicious ...

متن کامل

2-LAMA Architecture vs. BitTorrent Protocol in a Peer-to-Peer Scenario

In this paper, we review our Multi-Agent System (MAS) architecture (2LAMA) proposed to assist existing MAS. This architecture consists of two levels: the conventional MAS system and an additional meta-level in charge of assistance. We illustrate our approach in a Peer-to-Peer sharing network scenario and compare it with the commonly used BitTorrent protocol. Experiments show that the cost of ad...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017