Preview

The Darknet and the Future of Content Distribution

Good Essays
Open Document
Open Document
8123 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Darknet and the Future of Content Distribution
The Darknet and the Future of Content Distribution

Peter Biddle, Paul England, Marcus Peinado, and Bryan Willman

Microsoft Corporation

Abstract

We investigate the darknet – a collection of networks and technologies used to share digital content. The darknet is not a separate physical network but an application and protocol layer riding on existing networks. Examples of darknets are peer-to-peer file sharing, CD and DVD copying, and key or password sharing on email and newsgroups. The last few years have seen vast increases in the darknet’s aggregate bandwidth, reliability, usability, size of shared library, and availability of search engines. In this paper we categorize and analyze existing and future darknets, from both the technical and legal perspectives. We speculate that there will be short-term impediments to the effectiveness of the darknet as a distribution mechanism, but ultimately the darknet-genie will not be put back into the bottle. In view of this hypothesis, we examine the relevance of content protection and content distribution architectures.

1 Introduction
People have always copied things. In the past, most items of value were physical objects. Patent law and economies of scale meant that small scale copying of physical objects was usually uneconomic, and large-scale copying (if it infringed) was stoppable using policemen and courts. Today, things of value are increasingly less tangible: often they are just bits and bytes or can be accurately represented as bits and bytes. The widespread deployment of packet-switched networks and the huge advances in computers and codec-technologies has made it feasible (and indeed attractive) to deliver such digital works over the Internet. This presents great opportunities and great challenges. The opportunity is low-cost delivery of personalized, desirable high-quality content. The challenge is that such content can be distributed illegally. Copyright law governs the legality of



References: [3] R. Albert, H. Jeong and A.-L. Barabási, Diameter of the world-wide web, Nature 401, pages 130—131, 1999. [5] A.-L. Barabási, R. Albert, Emergence of scaling in random networks, Science 286, pages 509—512, 1999. [6] I. Clarke, O. Sandberg, B. Wiley and T. Hong, Freenet: A distributed information storage and retrieval system, International Workshop on Design Issues in Anonymity and Unobservability, 2000. [10] S. Hand and T. Roscoe, Mnemosyne: peer-to-peer steganographic storage, In Proceedings of the First International Workshop on Peer-to-Peer Systems, 2002. [18] J. Kleinberg, Navigation in a small world, Nature 406, 2000. [19] J. Kleinberg, Small-world phenomena and the dynamics of information, Advances in Neural Information Processing Systems (NIPS) 14, 2001. [20] S. Milgram, The small world problem, Psychology Today, vol. 2, pages 60—67, 1967. [21] M .Newman, Small worlds: the structure of social networks, Santa Fe Institute, Technical Report 99-12-080, 1999. [22] M. Newman, D. Watts and S. Strogatz, Random graph models of social networks, Proc. Natl. Acad. Sci. USA 99, pages 2566—2572, 2002. [23] I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, H. Balakrishnan, CHORD: A scalable peer-to-peer lookup service for internet applications, In Proceedings of the ACM SIGCOMM 2001 Conference SIGCOMM-01, pages 149—160, 2001.

You May Also Find These Documents Helpful

  • Powerful Essays

    With the proliferation of 3-D Printers and the availability of copyrighted materials posted online, there is an additional facet to the current debate surrounding copyright and ownership of intellectual property. Piracy of digital media such as music and videos has been a long-standing issue since the 1990’s with Napster and similar peer-to-peer file sharing programs.…

    • 4860 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Cis 324 Computer Ethics

    • 2262 Words
    • 10 Pages

    In the short time that computers and internet have existed in the modern era, the world has seen a complete 360 degree turn and in the various forms of electronic entertainment that people all over the world are now using. In the days before CD’s, DVD’s and the internet, not much was said if a vinyl album (remember these?), VHS cassette (or these?) or an audio cassette was loaned to a friend for their listening / viewing pleasure, but today with the availability of sending an email with three or four megabytes (mb) of information, one can enjoy a borrowed song but is assumed that it is piracy or stealing. Is this a fair assumption? This Author will not give his opinion but rather discuss both sides of the Peer to Peer (P2P) downloading and sharing issues and let the reader form their own opinions.…

    • 2262 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Covering: New Civil Rights

    • 2040 Words
    • 9 Pages

    Cited: Weaver, Alfred, and Benjamin Morrison. "Social Networking." Social Networking. 41.2 (2008): 97-100. Web. 15 Oct. 2012.…

    • 2040 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Akamai Teknologi

    • 542 Words
    • 3 Pages

    BitTorrent is a protocol that supports the practice of peer-to-peer file sharing and is used for distributing large amounts of data over the Internet. Peer-to-peer (P2P) networking is a distributed application architecture that partitions tasks or work loads between peers. Emerging collaborative P2P systems are going beyond the era of peers doing similar things while sharing resources, and are looking for diverse peers that can bring in unique resources and capabilities to a virtual community thereby empowering it to engage in greater tasks beyond those that can be accomplished by individual peers, yet that are beneficial to all the peers.…

    • 542 Words
    • 3 Pages
    Good Essays
  • Good Essays

    References: Dean, T. (2009). Network+ Guide to Networks . In D. Tamara, Network+ Guide to Networks (p.…

    • 815 Words
    • 4 Pages
    Good Essays
  • Better Essays

    An important prediction of random network theory is regardless of the random placement of links most nodes will still have approximately the same number of links. In fact, in a random network the nodes follow a Poisson distribution with a bell shape (see Fig.1). Random networks are also called exponential, because the probability that a node is connected to k other sites decreases exponentially for large k. This is better described by the famous small world networks. It was Watts and Strogatz in 1998 that recognised that a class of random graphs could be categorised as small world networks. They noted that graphs could be classified according to their clustering coefficient and their diameter. Many random…

    • 1598 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Chapter 11

    • 383 Words
    • 2 Pages

    a. Formal Small-Group networks- Can be very complicated including hundreds of people and half-dozen or more hierarchical levels pg. 343…

    • 383 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    References: Hurwicz, Michael (2002, February 01). Peer pressure: Securing P2P networking. Network Magazine, (2), 60, Retrieved from http://elibrary.bigchalk.com…

    • 3909 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    Humanities Course Paper

    • 1596 Words
    • 7 Pages

    Smith, R. J. (2010). How the internet has evolved in the past 10 years. Retrieved November 14, 2012 from…

    • 1596 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Peer-to-peer (P2P) systems are popularly used as “file-swapping” networks to support distributed content sharing. A number of P2P networks for file sharing have been developed and deployed. Gnutella is among the most popular P2P systems. This chapter presents a broad overview of P2P computing and concentrates on Gnutella I in the context of Web Services discovery. It also emphasizes on the analysis of a revised mechanism that can achieve the ping pong message exchange objectives but with less network traffic. In addition, these chapters also suggest method in detail and provide lines of reasoning as to why it could.…

    • 4271 Words
    • 18 Pages
    Better Essays
  • Powerful Essays

    Bittorrent Protocol

    • 7770 Words
    • 32 Pages

    BitTorrent is a peer-to-peer file sharing protocol used to distribute large amounts of data. BitTorrent is one of the most common protocols for transferring large files. Its main usage is for the transfer of large sized files. It makes transfer of such files easier by implementing a different approach. A user can obtain multiple files simultaneously without any considerable loss of the transfer rate. It is said to be a lot better than the conventional file transfer methods because of a different principle that is followed by this protocol. It also evens out the way a file is shared by allowing a user not just to obtain it but also to share it with others. This is what has made a big difference between this and the conventional file transfer methods. It makes a user to share the file he is obtaining so that the other users who are trying to obtain the same file would find it easier and also in turn making these users to involve themselves in the file sharing process. Thus the larger the number of users the more is the demand and more easily a file can be transferred between them.…

    • 7770 Words
    • 32 Pages
    Powerful Essays
  • Powerful Essays

    SECTION 1. INTRODUCTION Social Networks are used by hundreds of millions of people around the world. Social Networks’1 impact on Records and Information Management (RIM) begins with clearly defining what we mean by a Social Network. For the purposes of this paper, a Social Network is defined as an internet-based service that allows individuals to (1) construct a public or semi-public profile within a bounded system, (2) articulate a list of other users with whom they share a connection, and (3) view and traverse their list of connections and those made by others within the system. The nature and nomenclature of these connections may vary from site to site.2 The widespread use…

    • 6927 Words
    • 28 Pages
    Powerful Essays
  • Powerful Essays

    Cooper and Shallice. (1995) Soar and the Case for Unified Theories of Cognition. Cognition 55. 115149…

    • 2898 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    such as the Internet. First, this article will define and provide an overview of the key…

    • 21022 Words
    • 85 Pages
    Powerful Essays
  • Best Essays

    intra-AS relations indicate the gradual transition of the Internet ecosystem from the hierarchical structure to a flatter…

    • 2557 Words
    • 16 Pages
    Best Essays

Related Topics