A transport layer abstraction for peer-to-peer networks

  title={A transport layer abstraction for peer-to-peer networks},
  author={Ronaldo Alves Ferreira and Christian Grothoff and Paul Ruth},
  journal={CCGrid 2003. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003. Proceedings.},
  • R. Ferreira, C. Grothoff, P. Ruth
  • Published 12 May 2003
  • Computer Science
  • CCGrid 2003. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003. Proceedings.
The initially unrestricted host-to-host communication model provided by the Internet Protocol has deteriorated due to political and technical changes caused by Internet growth. [] Key Method We present the details of an implementation of a transport service based on SMTP. Small-scale benchmarks are used to compare transport services over UDP, TCP, and SMTP.

Figures from this paper

Machine Learning for Bandwidth Management in Decentralized Networks
This thesis explores the feasibility of using machine learning to improve the quality of the transport selection and resource allocation over current approaches, and presents a design how reinforcement learning can be used and adapted to the given problem domain.
Query Forwarding Algorithm Supporting Initiator Anonymity in GNUnet
An alternative routing protocol applicable in GNUnet is proposed, which is resistant to Kugler's shortcut attacks and points out traceability of initiator.
The Free Secure Network Systems Group: Secure Peer-to-Peer Networking and Beyond
  • C. Grothoff
  • Computer Science
    2011 First SysSec Workshop
  • 2011
The current research and future plans of the Free Secure Network Systems Group at the Technische Universitaet Muenchen are introduced and some insight into the development process and architecture of the GNU net P2P framework is provided.
Methods for secure decentralized routing in open networks
The study and improvement of secure, decentralized, robust routing algorithms for open networks including ad-hoc networks and peer-to-peer (P2P) overlay networks and a serious vulnerability in the Tor protocol was discovered which allowed us to use a DoS attack to reduce the anonymity of the users of this extant anonymizing P2P network.
Sauvegarde coopérative entre pairs pour dispositifs mobiles
The features of a collaborative backup service for mobile devices, which relies on collaboration among peers in order to provide data backup and recovery, and the expected dependability properties are presented.
Autonomous NAT Traversal
This paper presents how the method for autonomous NAT traversal is supposed to work in theory, discusses some possible variations, introduces various concrete implementations of the proposed approach and evaluates empirical results of a measurement study designed to evaluate the efficacy of the idea in practice.
Secure Communication over Diverse Transports
This paper describes BTP, a protocol that ensures the confide ntiality, integrity, authenticity and forward secrecy of commun ication over diverse underlying transports, from low-latency, bid
Secure communication over diverse transports: [short paper]
BTP is designed for use in censorship-resistant delay-tolerant overlays that operate over heterogeneous mixtures of underlying transports, by providing consistent security properties for a very wide range of transports, and simplifies the design and implementation of such overlays.
How to achieve blocking resistance for existing systems enabling anonymous web surfing
A blocking resistant, practical and usable system for anonymous web surfing that tries to provide as much reachability and availability as possible, even to users in countries where the free flow of information is legally, organizationally and physically restricted.
gap - Practical Anonymous Networking
This paper describes how anonymity is achieved in gnunet, a framework for anonymous distributed and secure networking.


Traditional IP Network Address Translator (Traditional NAT)
Together, these two operations, referred to as traditional NAT, provide a mechanism to connect a realm with private addresses to an external realm with globally unique registered addresses.
Requirements for Internet Hosts - Communication Layers
This RFC is an official specification for the Internet community. It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts.
Project JXTA: A Technology Overview
No single search engine or portal can locate and catalog the ever-increasing amount of information on the Web in a timely way and finding useful information in real time is increasingly difficult.
Standard for the transmission of IP datagrams over public data networks
This RFC specifies a standard adopted by CSNET, the VAN gateway, and other organizations for the transmission of IP datagrams over the X.25-based public data networks.
Efficient Sharing of Encrypted Data
The main idea advocated in this paper is that simple cryptographic techniques are sufficient to engineer an efficient data encoding that can make it significantly harder to selectively censor information.
An Extensible Message Format for Delivery Status Notifications
This memo defines a MIME content-type that may be used by a message transfer agent (MTA) or electronic mail gateway to report the result of an attempt to deliver a message to one or more recipients.
Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies
This set of documents, collectively called the Multipurpose Internet Mail Extensions, or MIME, redefines the format of messages to allow for MIME to be used in e-mail.
Infranet: Circumventing Web Censorship and Surveillance
The design, a prototype implementation, security properties, and performance of Infranet, a system that enables clients to surreptitiously retrieve sensitive content via cooperating Web servers distributed across the global Internet, are described.
A Bayesian Approach to Filtering Junk E-Mail
This work examines methods for the automated construction of filters to eliminate such unwanted messages from a user’s mail stream, and shows the efficacy of such filters in a real world usage scenario, arguing that this technology is mature enough for deployment.
An evaluation of Naive Bayesian anti-spam filtering
It is reached that additional safety nets are needed for the Naive Bayesian anti-spam filter to be viable in practice.