HOME

TheInfoList



OR:

FastTrack is a
peer-to-peer Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer ...
(P2P)
protocol Protocol may refer to: Sociology and politics * Protocol (politics), a formal agreement between nation states * Protocol (diplomacy), the etiquette of diplomacy and affairs of state * Etiquette, a code of personal behavior Science and technology ...
that was used by the Kazaa, Grokster, iMesh and Morpheus
file sharing File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Common methods of storage, transmission and dispersion include r ...
programs. FastTrack was the most popular file sharing network in 2003, and used mainly for the exchange of music
mp3 MP3 (formally MPEG-1 Audio Layer III or MPEG-2 Audio Layer III) is a coding format for digital audio developed largely by the Fraunhofer Society in Germany, with support from other digital scientists in the United States and elsewhere. Origin ...
files. The network had approximately 2.4 million concurrent users in 2003. It is estimated that the total number of users was greater than that of
Napster Napster was a peer-to-peer file sharing application. It originally launched on June 1, 1999, with an emphasis on digital audio file distribution. Audio songs shared on the service were typically encoded in the MP3 format. It was founded by Sha ...
at its peak.


History

The FastTrack protocol and Kazaa were created and developed by
Estonia Estonia, formally the Republic of Estonia, is a country by the Baltic Sea in Northern Europe. It is bordered to the north by the Gulf of Finland across from Finland, to the west by the sea across from Sweden, to the south by Latvia, an ...
n programmers of BlueMoon Interactive headed by Jaan Tallinn, the same team that later created
Skype Skype () is a proprietary telecommunications application operated by Skype Technologies, a division of Microsoft, best known for VoIP-based videotelephony, videoconferencing and voice calls. It also has instant messaging, file transfer, debi ...
. After selling it to Niklas Zennström from
Sweden Sweden, formally the Kingdom of Sweden,The United Nations Group of Experts on Geographical Names states that the country's formal name is the Kingdom of SwedenUNGEGN World Geographical Names, Sweden./ref> is a Nordic countries, Nordic c ...
and Janus Friis from
Denmark ) , song = ( en, "King Christian stood by the lofty mast") , song_type = National and royal anthem , image_map = EU-Denmark.svg , map_caption = , subdivision_type = Sovereign state , subdivision_name = Kingdom of Denmark , establish ...
, it was introduced in March 2001 by their Dutch company Consumer Empowerment. It appeared during the end of the first generation of
P2P networks Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer n ...
Napster Napster was a peer-to-peer file sharing application. It originally launched on June 1, 1999, with an emphasis on digital audio file distribution. Audio songs shared on the service were typically encoded in the MP3 format. It was founded by Sha ...
shut down in July of that year. There are three FastTrack-based networks, and they use mutually incompatible versions of the protocol. The most popular clients on each are Kazaa (and its variations), Grokster, and iMesh. For more information about the various
lawsuit - A lawsuit is a proceeding by a party or parties against another in the civil court of law. The archaic term "suit in law" is found in only a small number of laws still in effect today. The term "lawsuit" is used in reference to a civil act ...
s surrounding Kazaa and Sharman Networks, see Kazaa.


Technology

FastTrack uses supernodes to improve
scalability Scalability is the property of a system to handle a growing amount of work by adding resources to the system. In an economic context, a scalable business model implies that a company can increase sales given increased resources. For example, a ...
. To allow downloading from multiple sources, FastTrack employs the UUHash hashing algorithm. While UUHash allows very large files to be
checksum A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced during its transmission or storage. By themselves, checksums are often used to verify data ...
med in a short time, even on slow weak
computer A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations ( computation) automatically. Modern digital electronic computers can perform generic sets of operations known as programs. These prog ...
s, it also allows for massive
corruption Corruption is a form of dishonesty or a criminal offense which is undertaken by a person or an organization which is entrusted in a position of authority, in order to acquire illicit benefits or abuse power for one's personal gain. Corruption m ...
of a file to go unnoticed. Many people, as well as the
RIAA The Recording Industry Association of America (RIAA) is a trade organization that represents the music recording industry in the United States. Its members consist of record labels and distributors that the RIAA says "create, manufacture, and/ ...
, have exploited this
vulnerability Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." A window of vulnerability (WOV) is a time frame within which defensive measures are diminished, com ...
to spread corrupt and fake files on the network.Thomas Mennecke
How Overpeer was able to corrupt data on the FastTrack network
. 2005.
The FastTrack protocol uses
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can d ...
and was not documented by its creators. The first clients were all closed source software. However, initialization data for the encryption algorithms is sent in the clear and no
public key Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic al ...
encryption is used, so
reverse engineering Reverse engineering (also known as backwards engineering or back engineering) is a process or method through which one attempts to understand through deductive reasoning how a previously made device, process, system, or piece of software accompli ...
was made comparatively easy. In 2003,
open source Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use the source code, design documents, or content of the product. The open-source model is a decentralized so ...
programmer A computer programmer, sometimes referred to as a software developer, a software engineer, a programmer or a coder, is a person who creates computer programs — often for larger computer software. A programmer is someone who writes/creates ...
s succeeded in reverse-engineering the portion of the protocol dealing with client- supernode communication, but the supernode-supernode communication protocol remains largely unknown.


Clients

The following programs are or have been FastTrack clients: * Kazaa and variants * KCeasy (requires the gIFT-fasttrack plugin) * Grokster * iMesh * Morpheus, until 2002 * Apollon - KDE-Based * giFT-FastTrac

– a
giFT A gift or a present is an item given to someone without the expectation of payment or anything in return. An item is not a gift if that item is already owned by the one to whom it is given. Although gift-giving might involve an expectation ...
plugin *
MLDonkey MLDonkey is an open-source, multi-protocol, peer-to-peer file sharing application that runs as a back-end server application on many platforms. It can be controlled through a user interface provided by one of many separate front-ends, including ...
, a free multi-platform multi-network file sharing client


See also

* Kad network * Overnet * Open Music Model * Comparison of file sharing applications


References


External links


giFT-FastTrack home page

Documentation of the known parts of the FastTrack protocol
from giFT-FastTrack * Boardwatch Interview with Niklas Zennstrom July 17, 2003
FTWall
- A firewalling technique for blocking the fast-track protocol. *
Advanced Peer-Based Technology Business Models
'. Ghosemajumder, Shuman.
MIT Sloan School of Management The MIT Sloan School of Management (MIT Sloan or Sloan) is the business school of the Massachusetts Institute of Technology, a private university in Cambridge, Massachusetts. MIT Sloan offers bachelor's, master's, and doctoral degree programs ...
, 2002. *
Music Downloads: Pirates- or Customers?
''. Silverthorne, Sean. Harvard Business School Working Knowledge, 2004. {{DEFAULTSORT:Fasttrack File sharing networks File transfer protocols