نتایج جستجو برای: bittorrent
تعداد نتایج: 914 فیلتر نتایج به سال:
Glasnost runs on 20 servers on nine sites worldwide and is a part of Measurement Lab. Results collected from tests run by users show that 10% of BitTorrent tests indicated rate limiting over the 18 months of deployment. They also show that: major ISPs do rate-limit BitTorrent traffic. Rate-limiting is more common in the upstream direction and is based on both packet port and content; some ISPs ...
We examine the performance dynamics of a generic media delivery service, in which a single provider distributes to a set of peers using a BitTorrent-like protocol. Previous studies of BitTorrent have examined its performance in delivering single objects; here we discuss the dynamics of distributing a population of objects. Specifically, we assume that peers cache objects they download, and exam...
BitTorrent is one of the most popular Peer-to-Peer (P2P) content distribution applications over the Internet that significantly contributes in network
With the popularity of BitTorrent-like P2P applications, improving its performance has been an active research area. Super-seeding, a special upload policy for the initial seeder, improves the efficiency in producing multiple seeds and reduces the uploading bytes of content initiators, thus being highly expected as a promising solution for improving downloading performance while decreasing uplo...
It has been observed that the maximum bandwidth usage incurred during the file transfers on the internet mainly corresponds to the large chunks of data, which typically consists of continuous media, for example videos, movies or the sound files. Data packages like bulky software executables also contribute to the bandwidth usage. Peer to peer file transfer systems have now become enormously pop...
recently, peer-to-peer (p2p) networks contribute to a large fraction of the internet backbone traffic. consequently, misusing such networks for malicious purposes is a potential side effect. in this review article, we investigate different techniques of misusing p2p overlay networks to launch large-scale next-generation distributed denial of service (ddos) attacks. in particular, we investigate...
The popularity of Peer-to-Peer (P2P) Internet communication technologies being exploited to aid cybercrime is ever increasing. P2P systems can be used or exploited to aid in the execution of a large number of online criminal activities, e.g., copyright infringement, fraud, malware and virus distribution, botnet creation, and control. P2P technology is perhaps most famous for the unauthorised di...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید