Proceedings the Third IEEE Workshop on Internet Applications. WIAPP 2003
DOI: 10.1109/wiapp.2003.1210295
|View full text |Cite
|
Sign up to set email alerts
|

Deconstructing the Kazaa network

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
122
0
2

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 140 publications
(125 citation statements)
references
References 9 publications
1
122
0
2
Order By: Relevance
“…For other P2P systems than BitTorrent, several measurement studies of P2P networks have addressed the issues of availability [2,4,6], integrity [10], flashcrowds [5,9], and download performance [1,15,14,3,4]. Most of the availability studies only span a few days [2] or weeks [4], making it difficult to draw conclusions on long-term peer behavior.…”
Section: Related Workmentioning
confidence: 99%
“…For other P2P systems than BitTorrent, several measurement studies of P2P networks have addressed the issues of availability [2,4,6], integrity [10], flashcrowds [5,9], and download performance [1,15,14,3,4]. Most of the availability studies only span a few days [2] or weeks [4], making it difficult to draw conclusions on long-term peer behavior.…”
Section: Related Workmentioning
confidence: 99%
“…In most decentralized systems such as Gnutella and KaZaA, downloading traffic is highly focused around a small minority of popular targets and these popular files tend to be gradually concentrated in a small set of providers. For example, in Gnutella, 50% of all files are served by just 1% of nodes and 98% of all files are shared by the top 20% nodes [14]; in KaZaA, 10% most popular files generate 60% of the download traffic and 70% of the highly popular files will remain popular for at least 10∼15 days [18]. These are strong indications that a small fraction of popular hosts sharing the most interesting files could be conveniently leveraged as the early distributors, which effectively push security patches to active downloaders in the system.…”
Section: Scheme Descriptionmentioning
confidence: 99%
“…The second contribution of our research is the analysis of the impact on download traffic caching performance of simplifying assumptions introduced by previous studies [7,8]. In particular, the filename is considered as a unique identifier for the content, although several filenames may be associated to the same content and viceversa.…”
Section: Introductionmentioning
confidence: 99%