The Kazaa Overlay

The KaZaA Overlay: A Measurement Examine

Jian Liang

Department of Computer and

Information Technology,

Polytechnic University or college,

Brooklyn, NYC, USA 11201

Email: [email protected] poly. edu

Rakesh Kumar

Department of Electrical and

Computer Executive,

Polytechnic University or college,

Brooklyn, NEW YORK, USA 11201

Email: [email protected] poly. edu

Keith T. Ross

Division of Laptop and

Details Science,

Polytechnic University,

Brooklyn, NY, USA 11201

Email: [email protected] edu

September 12-15, 2004

Fuzy

Both in terms of quantity of participating users and in tra±c volume, KaZaA is one of the most important applications in the Internet today. However, because KaZaA is private and uses encryption, little is realized about KaZaA's overlay composition and mechanics, its messaging protocol, as well as index manage- ment. We have built two measurement device - the KaZaA Sni±ng Platform plus the KaZaA Prying Tool - to unravel many of the mysteries behind KaZaA. We deploy the apparatus to study KaZaA's overlay composition and dynamics, its neighbors selection, its use of active port numbers to circumvent ¯rewalls, and its index administration. Although this kind of study would not fully fix the KaZaA puzzle, that nevertheless leads to a logical description of KaZaA as well as overlay. Further- more, all of us leverage the measurement results to set forth a number of key concepts for the design of your successful unstructured P2P contribution. The way of measuring results and resulting style principles in this paper needs to be useful for long term architects of P2P overlay networks as well as for engineers managing ISPs. 1

1 Intro

On a standard day, KaZaA has more than 3 , 000, 000 active users sharing above 5, 1000 terabytes of content. Around the University of Washington campus network in June 2002, KaZaA consumed approximately 37% of all TCP tra±c, which has been more than 2 times the Web tra±c on the same grounds at the same time [8]. With over a few million satis¯ed users, KaZaA is signi¯cantly more popular than Napster or Gnutella ever before was. Sandvine estimates that in the US 76% of P2P ¯le sharing tra±c is definitely KaZaA/FastTrack tra±c and only 8% is Gnutella tra±c [23]. Obviously, both in terms of quantity of participating users and in tra±c volume, KaZaA is one of the most critical applications at any time carried by the Internet. Actually it can be contended that KaZaA has been so successful that any new proposal for a P2P ¯le sharing program should be in contrast to the KaZaA benchmark. However , largely because KaZaA can be described as proprietary protocol which codes its whistling messages, very little has been seen to date about the speci¯cs of KaZaA's overlay, the upkeep of the contribution, and the KaZaA signalling protocol. In this daily news we undertake a comprehensive measurement study of KaZaA's overlay structure and dynamics, the neighbor collection, its make use of dynamic interface numbers to circumvent ¯rewalls, and its index management. Although this research does not totally solve the KaZaA dilemna, it on the other hand leads to a coherent explanation of KaZaA and its overlay, while rendering many new observations about the main points of KaZaA. To unravel the insider secrets of the KaZaA overlay, we developed two measurement equipment: the KaZaA Sni±ng Program and the KaZaA Probing Device. The KaZaA Sni±ng System is a group of KaZaA nodes that are forced to interconnect in a con- trolled manner with one another, while one node is also connected to a huge selection of platform-external KaZaA nodes. The KaZaA Sni±ng Platform collects KaZaA sig- nalling tra±c, from which we could draw a conclusion about the structure and dynamics in the KaZaA contribution. The KaZaA Probing Tool establishes a TCP connection with any delivered KaZaA node, handshakes get back node, and sends and receives irrelavent encrypted KaZaA messages while using node. It is used for inspecting node availabilities and KaZaA neighbor variety. Both of these equipment consume limited resources. One of many contributions of this paper is to show how it is possible to obtain extensive overlay...

References: November, 2003.

[17] J. Kurose, K. W. Ross, Networking: A Top-Down Approach Offering

the Internet, " Addison-Wesley, 2006.

[19] M. Liang, L. Kumar, Sumado a. Xi, K. W. Ross, Pollution in P2P File Sharing Systems, "

submitted, 2004.

Supercomputing, New York City, NY, USA, June, 2002.

Internet Computer Journal, volume. 6, number 1, 2002.

Analysis of sites Content Delivery Systems, " Proceedings of the 5th Conference, seminar

on Systems Design and Implementation (OSDI 2002), Boston, MA, USA,

Work Existence Balance Dissertation

Work/Life Equilibrium – Challenges and Alternatives: In a culture filled with inconsistant responsibilities and commitments, work/life balance has become a predominant a significant the workplace. 3 major elements…...

Read..

Health Privileges and Responsibilities Hsm 542 Essay

Medicare Financed Organ Transplants Keller Graduate student School of Management Wellness Rights and Responsibilities HSM 542 Medicare Funded Body organ Transplants: Moral Issues Advantages…...

Read..
 Narcotics Article

Narcotics Article

NARCOTICS What are opiates? Opiates, also referred to as narcotics, are a group of drugs which are used medically to relieve average to severe pain, but also…...

Read..

Essay on The Nexus Between Crime and Politics in Caribbean

The nexus of crime and politics in the Caribbean is the subject of several studies. Talk about the assumptive frameworks that explain this phenomenon and recommend how best the…...

Read..
 A Change Must Come Article

A Change Must Come Article

Jeremy Hudson " A Change Must Arrive. ” PHI 208 Mentor Michael Pankrast 1 Think about living in a global where…...

Read..

Emmitt MBA723 E1WW McKinsey Company Insider Trading Scandal APA Version Essay

McKinsey & Company Insider Trading Scandal and Moral Hazard James Emmitt Assignment Wk. 3 – MBA 723 E1WW W15 Prof. Male impotence DeJaegher…...

Read..