Techniques for measuring peer-to-peer (P2P) networks
First Claim
Patent Images
1. A system comprising:
- a machine including a processor and a memory;
the machine configured with a Peer-To-Peer (P2P) flooder stored in the memory and executed on the processor;
the P2P flooder distributes links, the links pretend to be associated with content over a plurality of P2P networks, but the links are actually to the P2P uploader and the links are not for the content that the links pretend to be associated with, the links are also accompanied with advertisements to entice specific participants to activate the links,the machine also configured with a P2P uploader stored in the memory and executed on the processor;
the P2P uploader records metrics from the specific participants of the P2P networks when the participants attempt to acquire the content by accessing the links, the links point to the P2P uploader, the metrics include;
identities for the participants, bandwidth connections for each attempt to acquire the content, a particular P2P network from which a particular attempt to acquire the content is coming from, a date and time of a particular attempt to acquire the content, a name for the content that is being feigned, and an identity for the P2P flooder; and
the machine also configured with a measuring service stored in the memory and executed on the processor, the measuring service evaluates the metrics to develop measurements with respect to the P2P networks relative to one another, the metrics are also evaluated to develop profiles and ratings for each of the P2P networks, networks and for a type of content emerging as a preference in each of the P2P networks, and for specific P2P participants.
13 Assignments
0 Petitions
Accused Products
Abstract
Techniques for measuring Peer-To-Peer (P2P) networks are provided. P2P are initially seeded with links to feigned content. As a P2P participant accesses a link metrics are recorded about the P2P network being used by the participant. The metrics are used to form measurements to compare different P2P networks relative to one another.
-
Citations
20 Claims
-
1. A system comprising:
-
a machine including a processor and a memory; the machine configured with a Peer-To-Peer (P2P) flooder stored in the memory and executed on the processor;
the P2P flooder distributes links, the links pretend to be associated with content over a plurality of P2P networks, but the links are actually to the P2P uploader and the links are not for the content that the links pretend to be associated with, the links are also accompanied with advertisements to entice specific participants to activate the links,the machine also configured with a P2P uploader stored in the memory and executed on the processor;
the P2P uploader records metrics from the specific participants of the P2P networks when the participants attempt to acquire the content by accessing the links, the links point to the P2P uploader, the metrics include;
identities for the participants, bandwidth connections for each attempt to acquire the content, a particular P2P network from which a particular attempt to acquire the content is coming from, a date and time of a particular attempt to acquire the content, a name for the content that is being feigned, and an identity for the P2P flooder; andthe machine also configured with a measuring service stored in the memory and executed on the processor, the measuring service evaluates the metrics to develop measurements with respect to the P2P networks relative to one another, the metrics are also evaluated to develop profiles and ratings for each of the P2P networks, networks and for a type of content emerging as a preference in each of the P2P networks, and for specific P2P participants. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory machine accessible medium having instructions thereon, the instructions executed by a processor to perform a method of:
-
distributing, by the processor, a feigned reference to content on a plurality of Peer-To-Peer (P2P) networks, the feigned reference pretends to be associated with the content but is actually a link to a P2P uploader, and the feigned reference is also accompanied with an advertisement to further entice participants to activate the feigned reference; receiving, by the processor, attempts to access the content from the participants of the plurality of P2P networks; gathering, by the processor, metrics from the participants and the P2P networks in response to the attempts; identifying, by the processor, the metrics as identities for the participants attempting to access the content, identities of the P2P networks, an identity for the content, bandwidth connections for the participants, and environmental configurations for the participants; using the metrics to develop profiles and ratings for each of the P2P networks, for a type of content emerging as a preference within each of the P2P networks and for specific P2P participants; and synthesizing, by the processor, measurements for each of the P2P networks relative to remaining ones of the P2P networks in response to the metrics. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A machine-implemented method to execute on a processor, including:
-
receiving, by the processor, access attempts to content from participants of Peer-To-Peer (P2P) networks, the access attempts are made by the participants via the P2P networks for the content but the content does not exist and is feigned, the access attempts are links to a P2P uploader and the links are accompanied with advertisements to further entice the participants to activate the links; gathering, by the processor, metrics for the participants and their corresponding P2P networks; identifying, by the processor, the metrics are information for;
the participants, broadband connections for the participants, and date and time that an access attempt was received;notifying, by the processor, the participants that requests for the content cannot be satisfied; recording, by the processor, the metrics for subsequent analysis; and using the metrics to develop profiles and ratings for each of the P2P networks, to develop a profile to a type of content emerging as a preference within each of the P2P networks, and for specific P2P participants. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification