Font Size: a A A

Analysis Of The Safety Of BitTorrent Protocol

Posted on:2010-04-30Degree:MasterType:Thesis
Country:ChinaCandidate:W WangFull Text:PDF
GTID:2348330533468702Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of the internet in recent years,the technology of P2 P network has been widely used.And file-sharing application is the most important of P2 P technology.As the most popular file-sharing protocol,BitTorrent makes users share files more convenient.At the same time,BitTorrent makes the pirates easier to spread illegal copies,too.It brings a huge impact to the copyright protection system.In this paper,we focus on controlling the spread of files from a technology perspective.So,by the carefully analyzing the BitTorrent Protocol and the implementations,this paper summarizes the current used methods of controlling BitTorrent,analyzes the feasibility of each method,finds out the problems that may arise.Then,this paper proposes several points,including the classification to Trackers,the method of tracker's fake offline,totally chunk pollution of controlling BitTorrent client and the Choke&Unchoke method of controlling BitTorrent client.This paper gives some reference data about controlling BitTorrent by simulate the controlling of BitTorrent on the network simulation platform.Because the experiments did by the domestic and foreign scholars are all in the complete controlled environment or black-box analysis,this paper tests each method of controlling of BitTorrent on wide area network.By analyzing the gotten data,this paper gives the ratio of the controlling nodes to achieve better effect,and also gives the effect of totally chunk pollution and Choke&Unchoke method for different clients.
Keywords/Search Tags:BitTorrent, totally chunk pollution, choke&unchoke, safety analysis
PDF Full Text Request
Related items