TITLE

BITTORRENT'S SWARMS HAVE A DEADLY BITE ON BROADBAND NETS

AUTHOR(S)
Ellis, Leslie
PUB. DATE
May 2006
SOURCE
Multichannel News;5/8/2006, Vol. 27 Issue 19, p44
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article focuses on the impact of the file-downloading scheme known as BitTorrent on broadband networks. Based on a research done by Terry Shaw of Cable Labs and Jim Martin, a computer science professor at Clemson University in South Carolina, it only takes about 10 BitTorrrent users exchanging files on a node to double the delays experienced by electronic mail users and Web surfers. BitTorrent uses swarming to be more powerful than other peer-to-peer techniques.
ACCESSION #
20780643

 

Related Articles

  • Crank up P2P speed. Taylor, Nathan // Australian PC User;Jun2010, Vol. 22 Issue 6, p83 

    The article offers information on how to ensure maximum file download peer to peer (P2P) speed when using BitTorrent, an open source file-sharing online application. Choosing torrents with higher seeds or P2P users that are sharing the file are recommended. The need to check torrent availability...

  • Downloading trace study for BitTorrent P2P performance measurement and analysis. Hu, Chih-Lin; Lu, Zong-Xian // Peer-to-Peer Networking & Applications;Dec2012, Vol. 5 Issue 4, p384 

    With the increasing client population and the explosive volume of Internet media content, the peer-to-peer networking technologies and systems provide a rapid and scalable content distribution mechanism in the global networks. The BitTorrent protocol and its derivatives are among the most...

  • Peer profile based trust model for P2P systems using genetic algorithm. Selvaraj, Chithra; Anand, Sheila // Peer-to-Peer Networking & Applications;Mar2012, Vol. 5 Issue 1, p92 

    The open and anonymous nature of P2P allows peers to easily share their data and other resources among multiple peers, but the absence of a defensible border raise serious security concerns for the users. There is a lack of accountability for the content that is shared by peers and it is hard to...

  • Content owners continue trying to stamp out illegal filesharing. De Freitas, Ian // New Media Age;5/5/2005, p12 

    This article expresses opinion on the legality of peer-to-peer file sharing networks in Great Britain. The latest round of battles over the legality of peer-to-peer file sharing networks is set to come to a head with imminent rulings from the U.S. and Australian courts. On the face of it, the...

  • File Sharing Program: Users of Peer-to-Peer Networks Can Readily Access Child Pornography: GAO-04-757T. Koontz, Linda D. // GAO Reports;5/6/2004, p1 

    The availability of child pornography has dramatically increased in recent years as it has migrated from printed material to the World Wide Web, becoming accessible through Web sites, chat rooms, newsgroups, and now the increasingly popular peer-to-peer file sharing programs. These programs...

  • Hybrid framework for mitigating illegitimate Peer Nodes in Multimedia file sharing in P2P. Shahabadkara, Ramesh; Pujerib, Ramachandra V. // International Journal of Computer Science Issues (IJCSI);Jan2012, Vol. 9 Issue 1, p263 

    Peer to Peer network is one of the frequently used application in terms of file sharing over a global large network. In such types of network, there can exists an illegitimate peer node who will attempt to have an unauthorized access to premium digital content. As it is very difficult to catch...

  • Bad files on P2P. Taylor, Nathan // Australian PC User;Sep2007, Vol. 19 Issue 9, p84 

    The author discusses the computer security risk from files downloaded from peer-to-peer (P2P) networks. According to the author, any executable file downloaded and run from a P2P network is potentially a security risk. It is better to download the software from the vendor or creator's web site...

  • STILL DOWNLOADING? TSK, TSK.  // On Wall Street;May2005, Vol. 15 Issue 5, p32 

    Reveals that digital-music users are less likely to admit visiting peer-to-peer music sites than ever before, according to a study in the U.S.

  • How to avoid shaping. Taylor, Nathan // Australian PC User;May2010, Vol. 22 Issue 5, p75 

    The article presents suggestions on how to manage peer-to-peer (P2P) services. It is suggested to use a scheduler to manage off-peak downloads. It is advised to use applications such as Torrent Scheduler or Windows Task Scheduler. It is suggested to frequently check current usage of networks. It...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics