Skip to main content

Gnutella

 



What is Gnutella?

Gnutella is a large peer-to-peer network, it was celebrated two decades of existence on 14th March 2020 and it has millions of users for peer-to-peer file sharing. It was the first peer-to-peer network of its kind, leading to other, later networks adopting the model. However in June 2005, Gnutella's population was 1.81 million computers increasing to over three million nodes by January 2006. In late 2007, it was the most popular file-sharing network on the Internet with an estimated market share of more than 40%.

 

History of Gnutella

In early 2000, the Gnutella is also called a first client from which the network got its name was developed by Justin Frankel and Tom Pepper of Nullsoft, soon after the company’s acquisition by AOL. On March 14 the program was made available for download on Nullsoft’s servers. Therefore the event was prematurely announced on Slashdot, and thousands downloaded the program that day.  The source code was to be released later, under the GNU General Public Licence (GPL). However the developers never got the chance to accomplish this purpose.

The next day the AOL stopped the availability of the program over legal concerns and restrained Nullsoft from doing any further work in the project. However this did not stop Gnutella, after few days, the protocol have been reverse engineered, and compatible free and open source clones began to appear. This parallel development of different clients by different groups remains the modus operandi of Gnutella development today.

Gnutella Search and Retrieval Protocol


Gnutella did once operate on a purely query flooding -based protocol. The outdated Gnutella version 0.4 network protocol employs the following five different packet types, such that

  • ping: discover hosts on network
  • pong: reply to ping
  • query: search for a file
  • query hit: reply to query
  • push: download request for firewalled servants

These are mainly concerned with searching the Gnutella's network and file transfers are handled using HTTP.

Software that Support Gnutella

For macOS

The following software that support by macOS are

  • Acquisition
  • Poisoned

For Windows

The following software that support by Windows are

  • Shareaza
  • Morpheus
  • KCeasy
  • CitrixWire
  • Kiwi Alpha
  • BeerShare
  • BearFlix
  • Gnucleus-GnucDNA
  • Zultrax

For Java

The following software that support by Java are

  • Phex
  • Cabos
  • LimeWire
  • FilesWire (P2P)
  • WireShare (aka LimeWire Pirate Edition)

For Cross Platform

The following software that support by Cross Platform are

  • giFT (Gnutella's Plug-in)
  • gtk-gnutella'

For Other Platforms

The following software that support by other platforms are

  • CocoGnut – RISC OS
  • Symella – Symbian

Learn about Client (Computing)

 

Comments

Popular posts from this blog

Interconnecting Devices

Interconnecting Devices An Interconnecting devices is a network device. It used to transfer data from one computer to other computer with the help of network devices. There are five categories of interconnecting devices are such as. Router  Hubs  Switches/Bridge  Repeater  BRouter Repeater: Now I am going to tell you the repeater is an electronic device that used to receive and send a signal. It amplifies the signal and noise. It provides transmission of the signal.  HUB (Hyper User Bus):  In this, it used to link several computers in the same network. It based on broadcasting, and it sends the data to all computers and repeats the signal which receives a signal from one port and copies to other port and traffic are high. Bridge / Switch:  In this, we can see the interconnecting devices which can divide a single network into two or more segment are called Bridge / Switch.  It has multiple ports like 2, 4, 16, and 32. The Switch main...

Virtual Private Network (VPN)

  What is Virtual Private Network (VPN)? A virtual private network (VPN) is a secure connection between two private networks over a public network (in other words, over the Internet). All the data that flows over the VPN is encrypted. So anyone who steals packets from the VPN will find them unintelligible; only the parties on either end of the VPN are able to decrypt the packets. VPN connections are often called tunnels. Because they provide an isolated pathway from one point to another through the Internet. The only way to gain meaningful access to a VPN tunnel is at either end. Example for VPN Connections VPNs are used for There are two common uses for VPNs: To provide remote workers with secure access to your company network: To do that, you set up a VPN on the router, and then provide your remote workers with the credentials necessary to access the VPN. The remote workers can run a software VPN client on their home computers or laptops to connec...

Printer

What is Printer? Another widely used output device is a printer and it is a computer peripheral device. A printer produces a hard copy of a processed text or a result. A hard copy refers to a permanent human-readable text or graphics taken on physical print media such as paper or transparency. A printer will use toner to provide a quality print on paper, a toner is a replaceable material. Once the toner gets empty we can refill it and reuse it.  Most of the printers are used for commercial purposes such as private offices, industries, government offices, photo studios, etc,. Most of the printers are used to print emails, documents, files, images, color photos, color documents, color posts, banners, advertisement posters, etc,. There are the following 5 types of printers such as dot matrix printer, inkjet printer, laser printer, dye-sublimation printer, and plotter printer this are all the printer which uses nowadays for a printing purpose. A printer is characterized by the followin...