A transport layer abstraction for peer-to-peer networks
@article{Ferreira2003ATL, title={A transport layer abstraction for peer-to-peer networks}, author={Ronaldo Alves Ferreira and Christian Grothoff and Paul Ruth}, journal={CCGrid 2003. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003. Proceedings.}, year={2003}, pages={398-405} }
The initially unrestricted host-to-host communication model provided by the Internet Protocol has deteriorated due to political and technical changes caused by Internet growth. [] Key Method We present the details of an implementation of a transport service based on SMTP. Small-scale benchmarks are used to compare transport services over UDP, TCP, and SMTP.
16 Citations
Machine Learning for Bandwidth Management in Decentralized Networks
- Computer Science
- 2014
This thesis explores the feasibility of using machine learning to improve the quality of the transport selection and resource allocation over current approaches, and presents a design how reinforcement learning can be used and adapted to the given problem domain.
Query Forwarding Algorithm Supporting Initiator Anonymity in GNUnet
- Computer Science11th International Conference on Parallel and Distributed Systems (ICPADS'05)
- 2005
An alternative routing protocol applicable in GNUnet is proposed, which is resistant to Kugler's shortcut attacks and points out traceability of initiator.
The Free Secure Network Systems Group: Secure Peer-to-Peer Networking and Beyond
- Computer Science2011 First SysSec Workshop
- 2011
The current research and future plans of the Free Secure Network Systems Group at the Technische Universitaet Muenchen are introduced and some insight into the development process and architecture of the GNU net P2P framework is provided.
Methods for secure decentralized routing in open networks
- Computer Science
- 2011
The study and improvement of secure, decentralized, robust routing algorithms for open networks including ad-hoc networks and peer-to-peer (P2P) overlay networks and a serious vulnerability in the Tor protocol was discovered which allowed us to use a DoS attack to reduce the anonymity of the users of this extant anonymizing P2P network.
Sauvegarde coopérative entre pairs pour dispositifs mobiles
- Computer ScienceUbiMob '05
- 2005
The features of a collaborative backup service for mobile devices, which relies on collaboration among peers in order to provide data backup and recovery, and the expected dependability properties are presented.
Autonomous NAT Traversal
- Computer Science2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P)
- 2010
This paper presents how the method for autonomous NAT traversal is supposed to work in theory, discusses some possible variations, introduces various concrete implementations of the proposed approach and evaluates empirical results of a measurement study designed to evaluate the efficacy of the idea in practice.
Secure Communication over Diverse Transports
- Computer Science
- 2012
This paper describes BTP, a protocol that ensures the confide ntiality, integrity, authenticity and forward secrecy of commun ication over diverse underlying transports, from low-latency, bid…
Secure communication over diverse transports: [short paper]
- Computer ScienceWPES '12
- 2012
BTP is designed for use in censorship-resistant delay-tolerant overlays that operate over heterogeneous mixtures of underlying transports, by providing consistent security properties for a very wide range of transports, and simplifies the design and implementation of such overlays.
How to achieve blocking resistance for existing systems enabling anonymous web surfing
- Computer ScienceWPES '04
- 2004
A blocking resistant, practical and usable system for anonymous web surfing that tries to provide as much reachability and availability as possible, even to users in countries where the free flow of information is legally, organizationally and physically restricted.
gap - Practical Anonymous Networking
- Computer SciencePrivacy Enhancing Technologies
- 2003
This paper describes how anonymity is achieved in gnunet, a framework for anonymous distributed and secure networking.
References
SHOWING 1-10 OF 14 REFERENCES
Traditional IP Network Address Translator (Traditional NAT)
- Computer ScienceRFC
- 2001
Together, these two operations, referred to as traditional NAT, provide a mechanism to connect a realm with private addresses to an external realm with globally unique registered addresses.
Requirements for Internet Hosts - Communication Layers
- Computer ScienceRFC
- 1989
This RFC is an official specification for the Internet community. It
incorporates by reference, amends, corrects, and supplements the
primary protocol standards documents relating to hosts.…
Project JXTA: A Technology Overview
- Computer Science
- 2001
No single search engine or portal can locate and catalog the ever-increasing amount of information on the Web in a timely way and finding useful information in real time is increasingly difficult.
Standard for the transmission of IP datagrams over public data networks
- Computer ScienceRFC
- 1983
This RFC specifies a standard adopted by CSNET, the VAN gateway, and
other organizations for the transmission of IP datagrams over the
X.25-based public data networks.
Efficient Sharing of Encrypted Data
- Computer ScienceACISP
- 2002
The main idea advocated in this paper is that simple cryptographic techniques are sufficient to engineer an efficient data encoding that can make it significantly harder to selectively censor information.
An Extensible Message Format for Delivery Status Notifications
- BusinessRFC
- 1996
This memo defines a MIME content-type that may be used by a message transfer agent (MTA) or electronic mail gateway to report the result of an attempt to deliver a message to one or more recipients.…
Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies
- Computer Science, BusinessRFC
- 1996
This set of documents, collectively called the Multipurpose Internet Mail Extensions, or MIME, redefines the format of messages to allow for MIME to be used in e-mail.
Infranet: Circumventing Web Censorship and Surveillance
- Computer ScienceUSENIX Security Symposium
- 2002
The design, a prototype implementation, security properties, and performance of Infranet, a system that enables clients to surreptitiously retrieve sensitive content via cooperating Web servers distributed across the global Internet, are described.
A Bayesian Approach to Filtering Junk E-Mail
- Computer ScienceAAAI 1998
- 1998
This work examines methods for the automated construction of filters to eliminate such unwanted messages from a user’s mail stream, and shows the efficacy of such filters in a real world usage scenario, arguing that this technology is mature enough for deployment.
An evaluation of Naive Bayesian anti-spam filtering
- Computer ScienceArXiv
- 2000
It is reached that additional safety nets are needed for the Naive Bayesian anti-spam filter to be viable in practice.