P2P

P2P / Most Viewed

VIPR: New Developments in the VoIP Market

This is a new development in the VoIP market. This is how one of my colleagues, Cullen Jennings explained it to me. Today we have two widely deployed global identifiers for reaching people. One is delegated address out of DNS and the other is phone numbers. So I consider an address like email: [email protected] or xmpp:[email protected] to roughly be out of the DNS namespace and phone number to be out of the E.164 name space. Phone numbers have lots of parts that are not cool, but they also have some cool parts... more

Skype as a Platform for Secure VPN Tunnels?

Since Skype has an open client-side API, why not use it as a transport to tunnel VPN traffic and blow through firewalls to connect you to a remote system? That's the idea raised by Peeter P. Mõtsküla in his Skype Developer Blog entry: "Idea: skypetunnel". For instance, have a Skype client running on your home machine logged in as one account. Have Skype on your laptop on another account. Initiate a connection between the two of them and wind up with secure, encrypted access through the firewall from wherever you are. Being peer-to-peer, there would be no central servers or infrastructure required (outside the usual Skype p2p cloud.) This would require, of course, a yet-to-be-created "extra" that connected into the Skype client API and was installed on both systems...but that was the point of the article... more

The Great Internet Transformation? A First Stab

Is it just a coincidence that some of the leading Internet-based application companies are pushing aggressively into network connectivity at exactly the same time the major telephone companies are pushing into content? Or are we witnessing the end of the Internet as we know it? Think back to the online world fifteen years ago. There was AOL, there was Compuserve, there was Prodigy, and there was Apple's eWorld. Sure, there were researchers and students posting to Usenet newsgroups and navigating through Gopher sites, but the Internet was a sideshow for individuals and business users. ...the online world of those days was fragmented and small. Every online service was an island. Are we going back to those days? more

Another Wrong-Headed WSJ Editorial

Those wacky editorial writers at the Wall Street Journal just cannot seem to get the facts straight about network neutrality and what the FCC has done or can do on this matter. In the July 30, 2008 edition (Review and Outlook A14), the Journal vilifies FCC Chairman Kevin Martin for starting along the slippery slope of regulating Internet content. The Journal writers just seem to love hyperbole, and are not beyond ignoring the facts when they do not support a party line. Here are a few examples from the editorial... more

Is China Preparing to Go its Own Way with its Own Internet Root?

Interesting things happening in China. An article in the English edition of the People's Daily on line is headlined, Decimal network security address begins operation: "China's decimal network security address was officially launched. China has made a fundamental breakthrough in its Internet development; and actual use has been successful. The birth of decimal network technology makes China the only country able to unify domain names, IP addresses and MAC addresses into the text of a metric system..." Someone asked whether this was a rumored IPv9? It appears IPv9 is a project name, not a new protocol. It lumps together several activities, including at least... more

New Internet Study Finds Web and Streaming Higher Than P2P Traffic

ipoque, a European deep packet inspection hardware provider has published an Internet study for 2008/2009 providing an overview of the Internet's current state based on analyzing 1.3 petabytes of Internet traffic -- "the amount of data equal to 300,000 DVDs" -- in eight regions of the world (Northern Africa, Southern Africa, South America, Middle East, Eastern Europe, Southern Europe, Southwestern Europe, Germany). The study includes the use of about 100 of the most popular Internet protocols including P2P, VoIP, media streaming, instant messaging. more

Would the Real Network Neutrality Please Stand Up?

I'm sure this is something that's been raked over before, but I don't see a common understanding of what 'Net Neutrality' actually is. Despite many of the Internetorati demanding it by law. There appear to be several different camps, which you could paint as "bottom of IP", "middle" and "top". The bottomistas would see enforced Internet Protocol itself as a premature optimisation and violation of the end-to-end principle. Unhappy that you only get IPv4 or IPv6? Still grumpy that you only have IPv4 and not even IPv6? Really miserable that your VoIP packets are staggering under the poisonous load of IPv6 headers? You're a bottomista. more

Study Finds Spammers Use P2P Harvesting to Spam Millions

A recent study conducted by Blue Security reports how Internet users can unknowingly expose their contacts' emails addresses to Spammers while sharing files, music, games and DVDs over Peer-to-Peer (P2P) networks. The study has uncovered hundreds of incidents where files containing email addresses were made accessible in P2P networks. more

2050: The Internet Odyssey - How We Lost It and a Way to Get It Back

The Internet was replaced by a dual system created in 2014: a fiber optic network called "Net2Cash". It has a speed of one hundred Petabits per second (equivalent to 100 million Gigabits per second or 100,000 million Megabits per second). We no longer talk about Megabytes or Gigabytes because that is old school. Nowadays a couple of Exabites store the content of all written by man, from books and newspapers to Sumerian clay tablets; from Inca quipus and Egyptian hieroglyphs to all homework made by kids registered in elementary school. more

Study Reports on Baseline of Global IPv6 Adoption

A new research on native IPv6 traffic across six large providers in North America and Europe suggest that despite fifteen years of IPv6 standards development, vendor releases and advocacy, only a small fraction of the Internet has adopted IPv6. "The slow rate of IPv6 adoption stems from equal parts of technical/design hurdles, lack of economic incentives and general dearth of IPv6 content." more

Lights Going Out on the Internet? Not Just Yet

In his article titled, "End of Life Announcement", John Walker (author of the Speak Freely application) makes a few arguments about Network Address Translation (NAT) that are simply not true: "There are powerful forces, including government, large media organisations, and music publishers who think this situation is just fine. In essence, every time a user--they love the word "consumer"--goes behind a NAT box, a site which was formerly a peer to their own sites goes dark, no longer accessible to others on the Internet, while their privileged sites remain. The lights are going out all over the Internet. ...It is irresponsible to encourage people to buy into a technology which will soon cease to work." more

URLs: Ontologically Speaking

I was reading David Weinberger's reports on how the New York Times is planning on tackling its "link rot" problem where articles slip behind the pay-wall. Part of their solution appears to be to replace articles with their summaries. As usual, this got me thinking about telephony. Why don't phone calls and callers have URIs or URLs? ...Let's take addressing the endpoints first. Obviously, ENUM is one way of "Internetising" the phone number address space. more

The Ugly End of the Phone Network

I was a little early. "By the end of President Obama's first term, there won't be any more copper landlines left in the country, I blogged just after Obama had been elected. Before that I'd prophesized the end of POTS (Plain Old Telephone Service) by 2010. Nevertheless, the end is nigh. And it's gonna be ugly without some planning. more

FCC’s Comcast Ruling Inconsistent and Incoherent

After voting on the Comcast order today, Kevin Martin and his Democratic Party colleagues issued press releases telling us how they saved the Internet from Comcast's discriminatory practices, but they've failed to release the actual order they adopted and subsequently re-wrote. Commissioner McDowell wasn't allowed to see the revised order until 7:00 PM the night before the meeting. Rumor has it that high-level spin doctors are still trying to remove all the rough edges, inconsistencies, and factual errors. more

Why Isn’t Mobile Malware More Popular?

This is a followup to Wout de Natris' as usual excellent piece on the Enisa botnet report -- pointing out the current state of mobile malware and asking some questions I started off answering in a comment but it grew to a length where I thought it'd be better off in its own post. Going through previous iterations of Mikko's presentations on mobile malware is a fascinating exercise. more

Industry Updates

There are no postings submitted to this section yet.