Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Dissecting darknets: measurement and performance analysis
Chu X., Chen X., Jia A., Pouwelse J., Epema D. ACM Transactions on Internet Technology13 (3):1-25,2014.Type:Article
Date Reviewed: Aug 22 2014

If you are old enough, you probably remember Napster, a music downloading service using peer-to-peer (P2P) technology. Before Napster, file sharing, or any network service for that matter, used the client-server model, where a server is responsible for handling client requests. If there are many clients requesting services simultaneously, the server will be overloaded and unable to respond in time. On the contrary, in a P2P system, everyone in the network (a node) is both a client and a server. Every node has something that others want. Many communications between two nodes can take place at the same time, thus eliminating the server bottleneck.

However, one critical thing remains to be done: determining who has something that somebody wants. Napster was a service for locating the data or resources that existed in a node. Therefore, when the data (for example, music in MP3 form) violated copyright law, Napster became an easy target for law enforcement bureaus. As a result, various techniques have been developed to distribute the data location information in the network itself. Still, law enforcement officials could infiltrate the P2P network and find all of the machines distributing the illegal material.

To prevent such a scenario from happening, some P2P networks adopt a policy that requires users to register to use the P2P network, isolating it from nonregistered users. This is called a darknet. This paper tries to find out some statistical data from these darknets.

Alas, the data dissected seemed to be too intuitive. For example, since becoming a user in a darknet requires an invitation and approval, users in a darknet feel safer exchanging copyrighted material. Therefore, they put the data online for a longer amount of time, making it readily available and reducing the downloading time. It would be interesting to know what types of content are exchanged most often in a darknet. What kind of people use darknets? Is anonymity allowed and protected?

Reviewer:  R. S. Chang Review #: CR142644 (1411-0958)
Bookmark and Share
  Featured Reviewer  
 
Distributed Systems (C.2.4 )
 
Would you recommend this review?
yes
no
Other reviews under "Distributed Systems": Date
The evolution of a distributed processing network
Franz L., Sen A., Rakes T. Information and Management 7(5): 263-272, 1984. Type: Article
Jul 1 1985
A geographically distributed multi-microprocessor system
Angioletti W., D’Hondt T., Tiberghien J.  Concurrent languages in distributed systems: hardware supported implementation (, Bristol, UK,871985. Type: Proceedings
Oct 1 1985
A fault tolerant LAN with integrated storage, as part of a distributed computing system
Boogaard H., Bruins T., Vree W., Reijns G.  Concurrent languages in distributed systems: hardware supported implementation (, Bristol, UK,1001985. Type: Proceedings
Aug 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy