Changes between Version 7 and Version 8 of petconpaper


Ignore:
Timestamp:
Feb 26, 2009 8:45:23 PM (10 years ago)
Author:
anonymous
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • petconpaper

    v7 v8  
    3131        <li> Hidden services oriented - P2P friendly - only one HTTP outproxy (~= "exit node")
    3232</ul>
     33
     34I2P
     35
     36Abstract
     37
     38In the following we explain the I2P network, a message based low latency mixing network build
     39for anonymity and security. In detail the functions to sort and measure the
     40capacity and speed of the network nodes will be described. We show that this
     41approach works better than fixed speed rating used e.g. in the TOR network.
     42
     43
     44I2P Overview
     45
     46I2P itself is a overlay network based on unidirectional tunnels routed between
     47the I2P nodes. The used garlic routing is similar to the onion routing used by
     48TOR, trnasmitting data from hop to hop until the endpoint of the tunnel is
     49reached. In contrast to TOR we use only hidden services in I2P with addition
     50of a few otproxies operated by private individuals.
     51The ancestor of the I2P project was IIP - a specialiced IRC server and clients
     52transmiting their data via a mix network between themself. I2P was first started
     53as a specialized low latency transport protocal for The Freenet Project but soon
     54grew into a independent software project, driven by the author jrandom from
     552003 on until end of 2007. Other people joined coding and vanished in time between and
     56after jrandom vanished the project end of 2007, zzz and complication took over
     57active programming. The codebase itself is public domain or licensed under GPL
     58with exception, MIT or other free licenses. Most code is written in JAVA to
     59support the three main operating systems, Windows,Linux and MacOS X.
     60To maintain 1024bit pub-key encryption, some external libs as the GMP (GNU MP
     61Bignum Library) are interweaved with the java code.
     62The codebase is under active development with 7 releases in the year 2008 and
     63more than 100 development builds between those public releases.
     64Beside the core router itself some bundled software (e.g. a bittorrent client
     65based on snark, I2Psnark) are maintained by zzz and complication.
     66
     67In time writing this paper 830 active nodes are active in the I2P net. This
     68varies over time, as 50-100 new nodes joining the network every day and others
     69vanish. Usual on weekend times the peak of 1000 active nodes are reached and
     70in weekdays night the lower peak at 700 active routers happens. This shows a
     71quite stable base net on which the ~550 active destinations can act on.
     72I2P is oriented towards hidden services, all destinations inside the network
     73upon the nodes. Only one http outproxy (exit node in TOR terms) is known running
     74beside a IRC gateway for I2P development discussion. In contrast to TOR is I2P
     75peer to peer friendly and distributes the encrypted traffic between all
     76participating nodes.
     77The current bandwith used by all nodes is roughly 11 MByte/sec with peaks at 16
     78MByte/sec and the net builds ~40.000 tunnels producing this load.
     79In the last 6 month the net grew from 400 up to 800 nodes, from 5 to 10 MByte/sec
     80and from ~20.000 to ~40.000 tunnls, which shows the vital stats of the net
     81doubled in half a year. The forthcoming time shows ongoing stable growth.
     82
     83 Tunnel Overview
     84
    3385
    3486<h2>Tunnel Overview</h2><ul> - echelon will do this part