Preview

The Darknet and the Future of Content Distribution

Good Essays
Open Document
Open Document
8123 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Darknet and the Future of Content Distribution
The Darknet and the Future of Content Distribution

Peter Biddle, Paul England, Marcus Peinado, and Bryan Willman

Microsoft Corporation

Abstract

We investigate the darknet – a collection of networks and technologies used to share digital content. The darknet is not a separate physical network but an application and protocol layer riding on existing networks. Examples of darknets are peer-to-peer file sharing, CD and DVD copying, and key or password sharing on email and newsgroups. The last few years have seen vast increases in the darknet’s aggregate bandwidth, reliability, usability, size of shared library, and availability of search engines. In this paper we categorize and analyze existing and future darknets, from both the technical and legal perspectives. We speculate that there will be short-term impediments to the effectiveness of the darknet as a distribution mechanism, but ultimately the darknet-genie will not be put back into the bottle. In view of this hypothesis, we examine the relevance of content protection and content distribution architectures.

1 Introduction
People have always copied things. In the past, most items of value were physical objects. Patent law and economies of scale meant that small scale copying of physical objects was usually uneconomic, and large-scale copying (if it infringed) was stoppable using policemen and courts. Today, things of value are increasingly less tangible: often they are just bits and bytes or can be accurately represented as bits and bytes. The widespread deployment of packet-switched networks and the huge advances in computers and codec-technologies has made it feasible (and indeed attractive) to deliver such digital works over the Internet. This presents great opportunities and great challenges. The opportunity is low-cost delivery of personalized, desirable high-quality content. The challenge is that such content can be distributed illegally. Copyright law governs the legality of



References: [3] R. Albert, H. Jeong and A.-L. Barabási, Diameter of the world-wide web, Nature 401, pages 130—131, 1999. [5] A.-L. Barabási, R. Albert, Emergence of scaling in random networks, Science 286, pages 509—512, 1999. [6] I. Clarke, O. Sandberg, B. Wiley and T. Hong, Freenet: A distributed information storage and retrieval system, International Workshop on Design Issues in Anonymity and Unobservability, 2000. [10] S. Hand and T. Roscoe, Mnemosyne: peer-to-peer steganographic storage, In Proceedings of the First International Workshop on Peer-to-Peer Systems, 2002. [18] J. Kleinberg, Navigation in a small world, Nature 406, 2000. [19] J. Kleinberg, Small-world phenomena and the dynamics of information, Advances in Neural Information Processing Systems (NIPS) 14, 2001. [20] S. Milgram, The small world problem, Psychology Today, vol. 2, pages 60—67, 1967. [21] M .Newman, Small worlds: the structure of social networks, Santa Fe Institute, Technical Report 99-12-080, 1999. [22] M. Newman, D. Watts and S. Strogatz, Random graph models of social networks, Proc. Natl. Acad. Sci. USA 99, pages 2566—2572, 2002. [23] I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, H. Balakrishnan, CHORD: A scalable peer-to-peer lookup service for internet applications, In Proceedings of the ACM SIGCOMM 2001 Conference SIGCOMM-01, pages 149—160, 2001.

You May Also Find These Documents Helpful

  • Good Essays

    The review of “Copyright Law and the Internet” by John C. Montana will reveal different types of intellectual property, legal protection for intellectual property, and how the internet both complicates and simplifies intellectual property. There will also be some minor discussion of privacy, ethics, and security as they apply to intellectual property and the Internet. Much of the information found in the article is in line with the information found in the textbook.…

    • 668 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Covering: New Civil Rights

    • 2040 Words
    • 9 Pages

    Cited: Weaver, Alfred, and Benjamin Morrison. "Social Networking." Social Networking. 41.2 (2008): 97-100. Web. 15 Oct. 2012.…

    • 2040 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Akamai Teknologi

    • 542 Words
    • 3 Pages

    BitTorrent is a protocol that supports the practice of peer-to-peer file sharing and is used for distributing large amounts of data over the Internet. Peer-to-peer (P2P) networking is a distributed application architecture that partitions tasks or work loads between peers. Emerging collaborative P2P systems are going beyond the era of peers doing similar things while sharing resources, and are looking for diverse peers that can bring in unique resources and capabilities to a virtual community thereby empowering it to engage in greater tasks beyond those that can be accomplished by individual peers, yet that are beneficial to all the peers.…

    • 542 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Course Key Concepts

    • 1682 Words
    • 7 Pages

    5. Proximity principle – populate networks with the people they spend the most time with…

    • 1682 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Chapter 11

    • 383 Words
    • 2 Pages

    a. Formal Small-Group networks- Can be very complicated including hundreds of people and half-dozen or more hierarchical levels pg. 343…

    • 383 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    References: Dean, T. (2009). Network+ Guide to Networks . In D. Tamara, Network+ Guide to Networks (p.…

    • 815 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Humanities Course Paper

    • 1596 Words
    • 7 Pages

    Through the past several decades the advancement of technology has evolved. Among one of the advancements was the Internet. The Internet is a worldwide of networks connecting millions of computers. Through the Internet countries are able to exchange data, news and opinions. It started in the 1960’s when the internet was originally being used for government which later evolved to the world (Computer history museum, 2006). Over the past forty years the internet has changed technology of computers and how the world communicates, online banking, social networking, and online shopping. The Internet we know today grew from seeds planted by the U.S. Government. The Department of Defense issued a twenty thousand dollar contract on December 6, 1967 for the purpose of studying the design and specification of a computer network (Internet History from ARPANET to Broadband, 2007). It was conceived by the Advanced Research Projects Agency (ARPA) of the U.S. government in 1969 and was first known as the ARPANet (Computer history museum, 2006). The ARPA laid the groundwork which later became the internet. By 1992 the Internet has one million hosts (Ganna, 2006). Through the years the Internet has changed the way people live and run businesses. My project will walk through the discovery and evolution of the Internet.…

    • 1596 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    References: Hurwicz, Michael (2002, February 01). Peer pressure: Securing P2P networking. Network Magazine, (2), 60, Retrieved from http://elibrary.bigchalk.com…

    • 3909 Words
    • 16 Pages
    Powerful Essays
  • Better Essays

    Peer-to-peer (P2P) systems are popularly used as “file-swapping” networks to support distributed content sharing. A number of P2P networks for file sharing have been developed and deployed. Gnutella is among the most popular P2P systems. This chapter presents a broad overview of P2P computing and concentrates on Gnutella I in the context of Web Services discovery. It also emphasizes on the analysis of a revised mechanism that can achieve the ping pong message exchange objectives but with less network traffic. In addition, these chapters also suggest method in detail and provide lines of reasoning as to why it could.…

    • 4271 Words
    • 18 Pages
    Better Essays
  • Powerful Essays

    Bittorrent Protocol

    • 7770 Words
    • 32 Pages

    BitTorrent is a peer-to-peer file sharing protocol used to distribute large amounts of data. BitTorrent is one of the most common protocols for transferring large files. Its main usage is for the transfer of large sized files. It makes transfer of such files easier by implementing a different approach. A user can obtain multiple files simultaneously without any considerable loss of the transfer rate. It is said to be a lot better than the conventional file transfer methods because of a different principle that is followed by this protocol. It also evens out the way a file is shared by allowing a user not just to obtain it but also to share it with others. This is what has made a big difference between this and the conventional file transfer methods. It makes a user to share the file he is obtaining so that the other users who are trying to obtain the same file would find it easier and also in turn making these users to involve themselves in the file sharing process. Thus the larger the number of users the more is the demand and more easily a file can be transferred between them.…

    • 7770 Words
    • 32 Pages
    Powerful Essays
  • Powerful Essays

    Cooper and Shallice. (1995) Soar and the Case for Unified Theories of Cognition. Cognition 55. 115149…

    • 2898 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    such as the Internet. First, this article will define and provide an overview of the key…

    • 21022 Words
    • 85 Pages
    Powerful Essays
  • Satisfactory Essays

    Peer to Peer

    • 297 Words
    • 2 Pages

    In a peer-to-peer (P2P) network, every machine plays the role of client and server at the same time. Although a P2P network has a number of advantages over the traditional client-server model in terms of efficiency and fault-tolerance, additional security threats can be introduced. Users and IT administrators need to be aware of the risks from propagation of malicious code, the legality of downloaded content, and vulnerabilities within peer-to-peer software. Security and preventative measures should be implemented to protect from any potential leakage of sensitive information and possible security breaches. Within corporate networks, system administrators need to ensure that peer-to-peer traffic complies with the corporate security policy. In addition, they should only open a minimal set of firewall ports to allow for such traffic. For end-users and/or home users, precautions must also be taken to avoid the possible spread of viruses over peer-to-peer networks.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    intra-AS relations indicate the gradual transition of the Internet ecosystem from the hierarchical structure to a flatter…

    • 2557 Words
    • 16 Pages
    Best Essays
  • Powerful Essays

    SECTION 1. INTRODUCTION Social Networks are used by hundreds of millions of people around the world. Social Networks’1 impact on Records and Information Management (RIM) begins with clearly defining what we mean by a Social Network. For the purposes of this paper, a Social Network is defined as an internet-based service that allows individuals to (1) construct a public or semi-public profile within a bounded system, (2) articulate a list of other users with whom they share a connection, and (3) view and traverse their list of connections and those made by others within the system. The nature and nomenclature of these connections may vary from site to site.2 The widespread use…

    • 6927 Words
    • 28 Pages
    Powerful Essays

Related Topics