Protocol Measurements in BitTorrent Environments
نویسنده
چکیده
منابع مشابه
BitTorrent File Sharing in Mobile Ad-hoc Networks∗
This paper presents an application of the Group-based Service Discovery Protocol (GSD) to implement the BitTorrent file sharing protocol on dynamically variable mobile ad-hoc network (MANET) environments. We used a so called ’trackerless’ extension of the BitTorrent to make our system more efficient on mobile P2P networks. Also we have implemented a discrete event simulator in Java language, to...
متن کاملUsing BitNBD for Provisioning Virtual Machines in OpenCirrus Testbed
BitTorrent is a convenient tool for downloading and distributing very large files. This feature throws us a clue if virtual machine images in distributed environments are possible to move from one site to another. Users also gain the ability to have their computer that follows them rather than be tied to one physical location. In this paper, we explore how the BitTorrent protocol can be applied...
متن کاملUnveiling the BitTorrent Performance in Mobile WiMAX Networks
As mobile Internet environments are becoming widespread, how to revamp peer-to-peer (P2P) operations for mobile hosts is gaining more attention. In this paper, we carry out empirical measurement of BitTorrent users in a commercial WiMAX network. We investigate how handovers in WiMAX networks impact the BitTorrent performance, how BitTorrent peers perform from the aspects of connectivity, stabil...
متن کاملDDoS Vulnerability Analysis of Bittorrent Protocol
Bittorrent (BT) traffic had been reported to contribute to 30% of the Internet traffic nowadays and the number of participants have been growing rapidly. For such a protocol that significantly involved in the Internet traffic, the robustness and security must be evaluated carefully. In this paper, we analyze the BT protocol and identify several potential vulnerabilities available for malicious ...
متن کامل2-LAMA Architecture vs. BitTorrent Protocol in a Peer-to-Peer Scenario
In this paper, we review our Multi-Agent System (MAS) architecture (2LAMA) proposed to assist existing MAS. This architecture consists of two levels: the conventional MAS system and an additional meta-level in charge of assistance. We illustrate our approach in a Peer-to-Peer sharing network scenario and compare it with the commonly used BitTorrent protocol. Experiments show that the cost of ad...
متن کامل