نتایج جستجو برای: bittorrent

تعداد نتایج: 914  

2010
Bhavish Agarwal Aditya Akella Ashok Anand Athula Balachandran Pushkar Chitnis Chitra Muthukrishnan Ramachandran Ramjee George Varghese

Glasnost runs on 20 servers on nine sites worldwide and is a part of Measurement Lab. Results collected from tests run by users show that 10% of BitTorrent tests indicated rate limiting over the 18 months of deployment. They also show that: major ISPs do rate-limit BitTorrent traffic. Rate-limiting is more common in the upstream direction and is based on both packet port and content; some ISPs ...

2007
Richard J. Dunn Steven D. Gribble Henry M. Levy

We examine the performance dynamics of a generic media delivery service, in which a single provider distributes to a set of peers using a BitTorrent-like protocol. Previous studies of BitTorrent have examined its performance in delivering single objects; here we discuss the dynamics of distributing a population of objects. Specifically, we assume that peers cache objects they download, and exam...

2006
Amir H. Rasti

BitTorrent is one of the most popular Peer-to-Peer (P2P) content distribution applications over the Internet that significantly contributes in network

Journal: :International journal of Computer Networks & Communications 2011

Journal: :IEICE Transactions 2008
Zhijia Chen Chuang Lin Yang Chen Vaibhav Nivargi Pei Cao

With the popularity of BitTorrent-like P2P applications, improving its performance has been an active research area. Super-seeding, a special upload policy for the initial seeder, improves the efficiency in producing multiple seeds and reduces the uploading bytes of content initiators, thus being highly expected as a promising solution for improving downloading performance while decreasing uplo...

2007
Prabhat Saraswat Prashant Batra

It has been observed that the maximum bandwidth usage incurred during the file transfers on the internet mainly corresponds to the large chunks of data, which typically consists of continuous media, for example videos, movies or the sound files. Data packages like bulky software executables also contribute to the bandwidth usage. Peer to peer file transfer systems have now become enormously pop...

Journal: :journal of computer and robotics 0
hamid farhadi school of science and eng., sharif university of technology (international campus), kish, iran behzad akbari department of electrical and computer eng., tarbiat modares university, tehran, iran shahab rajaee school of science and eng., sharif university of technology (international campus), kish, iran mohammad farahani school of science and eng., sharif university of technology (international campus), kish, iran

recently, peer-to-peer (p2p) networks contribute to a large fraction of the internet backbone traffic. consequently, misusing such networks for malicious purposes is a potential side effect. in this review article, we investigate different techniques of misusing p2p overlay networks to launch large-scale next-generation distributed denial of service (ddos) attacks. in particular, we investigate...

Journal: :IJACI 2011
Mark Scanlon Alan Hannaway M. Tahar Kechadi

The popularity of Peer-to-Peer (P2P) Internet communication technologies being exploited to aid cybercrime is ever increasing. P2P systems can be used or exploited to aid in the execution of a large number of online criminal activities, e.g., copyright infringement, fraud, malware and virus distribution, botnet creation, and control. P2P technology is perhaps most famous for the unauthorised di...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید