Abstract We investigate the


Download 71.95 Kb.
NameAbstract We investigate the
page1/8
A typeAbstract
manual-guide.com > manual > Abstract
  1   2   3   4   5   6   7   8
The Darknet and the Future of Content Distribution
Peter Biddle, Paul England, Marcus Peinado, and Bryan Willman
Microsoft Corporation1
Abstract
We investigate the darknet – a collection of networks and technologies used to share digital content. The darknet is not a separate physical network but an application and protocol layer riding on existing networks. Examples of darknets are peer-to-peer file sharing, CD and DVD copying, and key or password sharing on email and newsgroups. The last few years have seen vast increases in the darknet’s aggregate bandwidth, reliability, usability, size of shared library, and availability of search engines. In this paper we categorize and analyze existing and future darknets, from both the technical and legal perspectives. We speculate that there will be short-term impediments to the effectiveness of the darknet as a distribution mechanism, but ultimately the darknet-genie will not be put back into the bottle. In view of this hypothesis, we examine the relevance of content protection and content distribution architectures.

1 Introduction


People have always copied things. In the past, most items of value were physical objects. Patent law and economies of scale meant that small scale copying of physical objects was usually uneconomic, and large-scale copying (if it infringed) was stoppable using policemen and courts. Today, things of value are increasingly less tangible: often they are just bits and bytes or can be accurately represented as bits and bytes. The widespread deployment of packet-switched networks and the huge advances in computers and codec-technologies has made it feasible (and indeed attractive) to deliver such digital works over the Internet. This presents great opportunities and great challenges. The opportunity is low-cost delivery of personalized, desirable high-quality content. The challenge is that such content can be distributed illegally. Copyright law governs the legality of copying and distribution of such valuable data, but copyright protection is increasingly strained in a world of programmable computers and high-speed networks.

For example, consider the staggering burst of creativity by authors of computer programs that are designed to share audio files. This was first popularized by Napster, but today several popular applications and services offer similar capabilities. CD-writers have become mainstream, and DVD-writers may well follow suit. Hence, even in the absence of network connectivity, the opportunity for low-cost, large-scale file sharing exists.

1.1 The Darknet


Throughout this paper, we will call the shared items (e.g. software programs, songs, movies, books, etc.) objects. The persons who copy objects will be called users of the darknet, and the computers used to share objects will be called hosts.

The idea of the darknet is based upon three assumptions:

  1. Any widely distributed object will be available to a fraction of users in a form that permits copying.

  2. Users will copy objects if it is possible and interesting to do so.

  3. Users are connected by high-bandwidth channels.


The darknet is the distribution network that emerges from the injection of objects according to assumption 1 and the distribution of those objects according to assumptions 2 and 3.

One implication of the first assumption is that any content protection system will leak popular or interesting content into the darknet, because some fraction of users--possibly experts–will overcome any copy prevention mechanism or because the object will enter the darknet before copy protection occurs.

The term “widely distributed” is intended to capture the notion of mass market distribution of objects to thousands or millions of practically anonymous users. This is in contrast to the protection of military, industrial, or personal secrets, which are typically not widely distributed and are not the focus of this paper.

Like other networks, the darknet can be modeled as a directed graph with labeled edges. The graph has one vertex for each user/host. For any pair of vertices (u,v), there is a directed edge from u to v if objects can be copied from u to v. The edge labels can be used to model relevant information about the physical network and may include information such as bandwidth, delay, availability, etc. The vertices are characterized by their object library, object requests made to other vertices, and object requests satisfied.

To operate effectively, the darknet has a small number of technological and infrastructure requirements, which are similar to those of legal content distribution networks. These infrastructure requirements are:

  1. facilities for injecting new objects into the darknet (input)

  2. a distribution network that carries copies of objects to users (transmission)

  3. ubiquitous rendering devices, which allow users to consume objects (output)

  4. a search mechanism to enable users to find objects (database)

  5. storage that allows the darknet to retain objects for extended periods of time. Functionally, this is mostly a caching mechanism that reduces the load and exposure of nodes that inject objects.


The dramatic rise in the efficiency of the darknet can be traced back to the general technological improvements in these infrastructure areas. At the same time, most attempts to fight the darknet can be viewed as efforts to deprive it of one or more of the infrastructure items. Legal action has traditionally targeted search engines and, to a lesser extent, the distribution network. As we will describe later in the paper, this has been partially successful. The drive for legislation on mandatory watermarking aims to deprive the darknet of rendering devices. We will argue that watermarking approaches are technically flawed and unlikely to have any material impact on the darknet. Finally, most content protection systems are meant to prevent or delay the injection of new objects into the darknet. Based on our first assumption, no such system constitutes an impenetrable barrier, and we will discuss the merits of some popular systems.

We see no technical impediments to the darknet becoming increasingly efficient (measured by aggregate library size and available bandwidth). However, the darknet, in all its transport-layer embodiments, is under legal attack. In this paper, we speculate on the technical and legal future of the darknet, concentrating particularly, but not exclusively, on peer-to-peer networks.

The rest of this paper is structured as follows. Section 2 analyzes different manifestations of the darknet with respect to their robustness to attacks on the infrastructure requirements described above and speculates on the future development of the darknet. Section 3 describes content protection mechanisms, their probable effect on the darknet, and the impact of the darknet upon them. In sections 4 and 5, we speculate on the scenarios in which the darknet will be effective, and how businesses may need to behave to compete effectively with it.

  1   2   3   4   5   6   7   8

Share in:

Related:

Abstract We investigate the iconAbstract The primary objective of this study is to propose an interdisciplinary...

Abstract We investigate the iconAbstract this study aimed to survey e-procurement in the Public Sector...

Abstract We investigate the iconAbstract The purpose of this white paper is to investigate the potential...

Abstract We investigate the iconS1 Students will investigate the characteristics and basic needs of plants and animals

Abstract We investigate the iconTask 11 Investigate current practices in relation to resource usage

Abstract We investigate the iconThis unit is provided as a sample of available resources and tasks;...

Abstract We investigate the iconIN7. 1 Investigate examples of conflict, cooperation, and interdependence...

Abstract We investigate the iconAbstract Insert abstract text here do not indent. Should be 150-200...

Abstract We investigate the iconAbstract put your abstract here. Use single spacing and don’t exceed...

Abstract We investigate the iconBob Beck is famous only among alt-med followers who investigate eletro-medicine...

Abstract We investigate the iconA pos system may be integrated to dvr system through direct serial...

Abstract We investigate the iconAbstract An abstract is a single paragraph, without indentation,...

Abstract We investigate the iconAbstract (The abstract should not exceed 250 words. It should briefly...

Abstract We investigate the icon[Type the abstract of the document here. The abstract is typically...

Abstract We investigate the iconAbstract+ed,+ing abstract+d,+ng

Abstract We investigate the iconAbstract The abstract, according to the

Abstract We investigate the iconAbstract The

Abstract We investigate the iconAbstract Background

Abstract We investigate the iconAbstract 4 Introduction 6

Abstract We investigate the iconAbstract studios




manual


When copying material provide a link © 2017
contacts
manual-guide.com
search