HOME

TheInfoList



OR:

FastTrack is a
peer-to-peer Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer ...
(P2P)
protocol Protocol may refer to: Sociology and politics * Protocol (politics), a formal agreement between nation states * Protocol (diplomacy), the etiquette of diplomacy and affairs of state * Etiquette, a code of personal behavior Science and technolog ...
that was used by the Kazaa,
Grokster Grokster Ltd. was a privately owned software company based in Nevis, West Indies that created the Grokster peer-to-peer file-sharing client in 2001 that used the FastTrack protocol. Grokster Ltd. was rendered extinct in late 2005 by the United St ...
,
iMesh iMesh was a media and file sharing client that was available in nine languages. It used a proprietary, centralized, P2P network (IM2Net) operating on ports 80, 443 and 1863. iMesh was owned by American company iMesh, Inc., who maintained dev ...
and
Morpheus Morpheus ('Fashioner', derived from the grc, μορφή meaning 'form, shape') is a god associated with sleep and dreams. In Ovid's ''Metamorphoses'' he is the son of Somnus and appears in dreams in human form. From the Middle Ages, the name b ...
file sharing File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Common methods of storage, transmission and dispersion include r ...
programs. FastTrack was the most popular file sharing network in 2003, and used mainly for the exchange of music
mp3 MP3 (formally MPEG-1 Audio Layer III or MPEG-2 Audio Layer III) is a coding format for digital audio developed largely by the Fraunhofer Society in Germany, with support from other digital scientists in the United States and elsewhere. Origin ...
files. The network had approximately 2.4 million
concurrent user In computer science, the number of concurrent users (sometimes abbreviated CCU) for a resource in a location, with the location being a computing network or a single computer, refers to the total number of people simultaneously accessing or using t ...
s in 2003. It is estimated that the total number of users was greater than that of Napster at its peak.


History

The FastTrack protocol and Kazaa were created and developed by
Estonia Estonia, formally the Republic of Estonia, is a country by the Baltic Sea in Northern Europe. It is bordered to the north by the Gulf of Finland across from Finland, to the west by the sea across from Sweden, to the south by Latvia, a ...
n programmers of BlueMoon Interactive headed by
Jaan Tallinn Jaan Tallinn (born 14 February 1972) is an Estonian billionaire computer programmer and investor known for his participation in the development of Skype and file-sharing application FastTrack/ Kazaa. Jaan Tallinn is a leading figure in the field ...
, the same team that later created
Skype Skype () is a proprietary telecommunications application operated by Skype Technologies, a division of Microsoft, best known for VoIP-based videotelephony, videoconferencing and voice calls. It also has instant messaging, file transfer, deb ...
. After selling it to
Niklas Zennström Niklas Zennström (; born 16 February 1966) is a Swedish entrepreneur and technology investor. Zennström is also the co-founder of the charity organization Zennström Philanthropies. Education Zennström has dual degrees in Business Administr ...
from
Sweden Sweden, formally the Kingdom of Sweden,The United Nations Group of Experts on Geographical Names states that the country's formal name is the Kingdom of SwedenUNGEGN World Geographical Names, Sweden./ref> is a Nordic country located on ...
and
Janus Friis Janus Friis (; born 26 June 1976) is a Danish entrepreneur best known for co-founding the file-sharing application Kazaa, and the peer-to-peer telephony application Skype. In September 2005, he and his business partner Niklas Zennström sold Sk ...
from
Denmark ) , song = ( en, "King Christian stood by the lofty mast") , song_type = National and royal anthem , image_map = EU-Denmark.svg , map_caption = , subdivision_type = Sovereign state , subdivision_name = Danish Realm, Kingdom of Denmark ...
, it was introduced in March 2001 by their
Dutch Dutch commonly refers to: * Something of, from, or related to the Netherlands * Dutch people () * Dutch language () Dutch may also refer to: Places * Dutch, West Virginia, a community in the United States * Pennsylvania Dutch Country People E ...
company Consumer Empowerment. It appeared during the end of the first generation of
P2P networks Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer n ...
Napster shut down in July of that year. There are three FastTrack-based networks, and they use mutually incompatible versions of the protocol. The most popular clients on each are Kazaa (and its variations), Grokster, and iMesh. For more information about the various
lawsuit - A lawsuit is a proceeding by a party or parties against another in the civil court of law. The archaic term "suit in law" is found in only a small number of laws still in effect today. The term "lawsuit" is used in reference to a civil actio ...
s surrounding Kazaa and Sharman Networks, see Kazaa.


Technology

FastTrack uses supernodes to improve
scalability Scalability is the property of a system to handle a growing amount of work by adding resources to the system. In an economic context, a scalable business model implies that a company can increase sales given increased resources. For example, a ...
. To allow downloading from multiple sources, FastTrack employs the
UUHash UUHash is a hash algorithm employed by clients on the FastTrack network. It is employed for its ability to hash very large files in a very short period of time, even on older computers. However, this is achieved by only hashing a fraction of the fil ...
hashing algorithm A hash function is any function that can be used to map data of arbitrary size to fixed-size values. The values returned by a hash function are called ''hash values'', ''hash codes'', ''digests'', or simply ''hashes''. The values are usually u ...
. While UUHash allows very large files to be
checksum A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced during its transmission or storage. By themselves, checksums are often used to verify data ...
med in a short time, even on slow weak
computer A computer is a machine that can be programmed to Execution (computing), carry out sequences of arithmetic or logical operations (computation) automatically. Modern digital electronic computers can perform generic sets of operations known as C ...
s, it also allows for massive
corruption Corruption is a form of dishonesty or a criminal offense which is undertaken by a person or an organization which is entrusted in a position of authority, in order to acquire illicit benefits or abuse power for one's personal gain. Corruption m ...
of a file to go unnoticed. Many people, as well as the
RIAA The Recording Industry Association of America (RIAA) is a trade organization that represents the music recording industry in the United States. Its members consist of record labels and distributors that the RIAA says "create, manufacture, and/o ...
, have exploited this
vulnerability Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." A window of vulnerability (WOV) is a time frame within which defensive measures are diminished, com ...
to spread corrupt and fake files on the network.Thomas Mennecke
How Overpeer was able to corrupt data on the FastTrack network
. 2005.
The FastTrack protocol uses
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
and was not documented by its creators. The first clients were all
closed source software Proprietary software is software that is deemed within the free and open-source software to be non-free because its creator, publisher, or other rightsholder or rightsholder partner exercises a legal monopoly afforded by modern copyright and inte ...
. However, initialization data for the encryption algorithms is sent in the clear and no
public key Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
encryption is used, so
reverse engineering Reverse engineering (also known as backwards engineering or back engineering) is a process or method through which one attempts to understand through deductive reasoning how a previously made device, process, system, or piece of software accompli ...
was made comparatively easy. In 2003,
open source Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use the source code, design documents, or content of the product. The open-source model is a decentralized sof ...
programmer A computer programmer, sometimes referred to as a software developer, a software engineer, a programmer or a coder, is a person who creates computer programs — often for larger computer software. A programmer is someone who writes/creates ...
s succeeded in reverse-engineering the portion of the protocol dealing with client- supernode communication, but the supernode-supernode communication protocol remains largely unknown.


Clients

The following programs are or have been FastTrack clients: * Kazaa and variants *
KCeasy A gift or a present is an item given to someone without the expectation of payment or anything in return. An item is not a gift if that item is already owned by the one to whom it is given. Although gift-giving might involve an expectation ...
(requires the gIFT-fasttrack plugin) *
Grokster Grokster Ltd. was a privately owned software company based in Nevis, West Indies that created the Grokster peer-to-peer file-sharing client in 2001 that used the FastTrack protocol. Grokster Ltd. was rendered extinct in late 2005 by the United St ...
*
iMesh iMesh was a media and file sharing client that was available in nine languages. It used a proprietary, centralized, P2P network (IM2Net) operating on ports 80, 443 and 1863. iMesh was owned by American company iMesh, Inc., who maintained dev ...
*
Morpheus Morpheus ('Fashioner', derived from the grc, μορφή meaning 'form, shape') is a god associated with sleep and dreams. In Ovid's ''Metamorphoses'' he is the son of Somnus and appears in dreams in human form. From the Middle Ages, the name b ...
, until 2002 * Apollon - KDE-Based * giFT-FastTrac

– a
giFT A gift or a present is an item given to someone without the expectation of payment or anything in return. An item is not a gift if that item is already owned by the one to whom it is given. Although gift-giving might involve an expectation ...
plugin *
MLDonkey MLDonkey is an open-source, multi-protocol, peer-to-peer file sharing application that runs as a back-end server application on many platforms. It can be controlled through a user interface provided by one of many separate front-ends, including ...
, a free multi-platform multi-network file sharing client


See also

*
Kad network The Kad network is a peer-to-peer (P2P) network which implements the Kademlia P2P overlay protocol. The majority of users on the Kad Network are also connected to servers on the eDonkey network, and Kad Network clients typically query known node ...
*
Overnet eDonkey2000 (nicknamed "ed2k") was a peer-to-peer file sharing application developed by US company MetaMachine ( Jed McCaleb and Sam Yagan), using the Multisource File Transfer Protocol. This client supports both the eDonkey2000 network and the ...
* Open Music Model *
Comparison of file sharing applications File sharing is a method of distributing electronically stored information such as computer programs and digital media. Below is a list of file sharing applications, most of them make use of peer-to-peer file sharing technologies. This comparis ...


References


External links


giFT-FastTrack home page

Documentation of the known parts of the FastTrack protocol
from giFT-FastTrack * Boardwatch Interview with Niklas Zennstrom July 17, 2003
FTWall
- A firewalling technique for blocking the fast-track protocol. *
Advanced Peer-Based Technology Business Models
'. Ghosemajumder, Shuman.
MIT Sloan School of Management The MIT Sloan School of Management (MIT Sloan or Sloan) is the business school of the Massachusetts Institute of Technology, a private university in Cambridge, Massachusetts. MIT Sloan offers bachelor's, master's, and doctoral degree programs, ...
, 2002. *
Music Downloads: Pirates- or Customers?
''. Silverthorne, Sean. Harvard Business School Working Knowledge, 2004. {{DEFAULTSORT:Fasttrack File sharing networks File transfer protocols