Free Essay

Usenet vs Torrents

In:

Submitted By gettoday
Words 938
Pages 4
Download speed

The first thing we’re going to take a look at when comparing Usenet vs Torrent, is the the download speed. With torrent (P2P) downloading, you need to rely on other persons to seed so you can download faster. Therefore your downloading speed will be restricted by the amount of seeders. If there are few seeders you’re going to download slower.

With Usenet, your downloading speed isn’t restricted by the amount of seeders and lechers. There’s no restriction. The downloading speed in only limited by your broadband. So if you have a fast internet, you’re going to download movies and shows quick. Usenet speeds are as fast as the end users internet connection.

File availability

Usenet vs Torerent, which one have the best file availability? The first movies and songs appeared on Usenet even before the birth of Napster & BitTorrent. Even today, the majority of content from top site uploaders gets on Usenet first, and then spread to the P2P communities. This is the way online distribution works, and there is no indication that this will change any time soon.

Content uploaded to Usenet have a close to definite lifespan. Therefore Usenet have a clear advantage over torrents in terms of file availability. Content on Usenet have a retention time of around 900 days and it’s still increasing. Files uploaded to BitTorrent relies on seeders, over time content on BitTorrent will die.

Seed ratio

How can we really compare Usenet vs Torrents, when Usenet don’t rely on seeders? Usenet gives you some definite benefits for a relatively low price and when you factor in the tens of thousands of people using dedicated servers and paying for seedboxes that cost more per month than a Usenet unlimited subscription, it kind of moots the argument that nobody pays to play with BitTorret.

To get a half decent speed, you need to be part of some sort of Private Torrent tracker, to be a part of a Private Tracker, you must also upload, or you will be kicked for leeching. As we know 95% of the internet’s population have a Internet connection where the download speed is higher than the upload speed. If you have an download speed of 12 Mbps, the upload speed would be around 1 Mbps. With the ratio 12:1, there’s is no way in the ocean you can download everything you want from torrents. You will always download more than you are able to upload. In this situation, you might be thinking of getting yourself a dedicated server or seedbox, but then the argument that BitTorrent is free disappear. And without this argument, Usenet is superior.

Security

A major concern for many P2P users is the lack of security. It’s a fact that ten thousands have been sued for illegal downloads. Usenet use SSL encryption (Secure Sockets Layer) to secure your privacy. To this day, no one has been sued for illegal activities by using Usenet. As a result Usenet’s security is far more superior.

With torrents, anyone can connect to the tracker and log all the traffic on that tracker if they wish. Not really secure is it? BitTorrent is designed to conect to everyone, everyone upload something, and it’s hard to NOT expose your IP adress. Your IP adress, when using BitTorrent, is at some point exposed, because it has to know where to send traffic… to send files via IP you have to know what the two IP’s are that are talking to eachother about. And since bittorrent depends on a massive swarm of users, it’s easy to hook up a logger to capture active IP’s when you download a torrent. When you’re done, you end up with a list of every single ip that gave you data. You don’t even have to download to get the ips, just query the tracker.

Price

News server access can cost anywhere from 8-11USD for unlimited downloading speed. But if you are unsatisfied with the downloading speed most torrents provide, worried by security and the need of better file availability, then Usenet is worth it. These are all reasons why I changed over to Usenet.

P2P downloading has a clear advantage over those who are unable or unwilling to spend money.

We must remember, that Usenet always will use all your broadband, meaning you will always download at full speed. Whereas torrens don’t.

Technology

Have you ever paid attention when you’ve downloaded torrents? You know that the file you download comes is many, many small files that have to be rejoined once downloaded? This concept come from Usenet where the files are compressed (.zip) into smaller files so it takes less time to download.

As with torrents, there are many different clients you can use. Basically, downloading with torrents and Usenet have many similarities; You browse the net and download a small file/link to your computer. Then the client on your computer tells a server what you want to download, and voila, you start gathering information from the server. With torrents, every person who have downloaded something operates as a “server”. Lechers (downloaders) and seeders (Uploaders). If there are many people downloading a file, but few seeders, downloading speed will be extremely awful.

Conclusion

Usenet has existed for 30 years, before WWW was born. There’s an old saying that no empire last forever, and P2P will not sit on the crown forever. While Usenet continues to expand, evolve and focusing on the mainstream public, P2P communities struggles with security problems and download speed. If this trend continues, it’s very possible that soon we will end up where it once began… With Usenet.

Similar Documents

Premium Essay

Intro to Linux

...A Practical Guide to Linux Commands, Editors, and Shell Programming SECOND EDITION ® Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com For sales outside the United States, please contact: International Sales international@pearson.com Visit us on the Web: informit.com/ph Library of Congress Cataloging-in-Publication...

Words: 228961 - Pages: 916

Premium Essay

Computer Tricks

...EC-Council Press | The Experts: EC-Council EC-Council’s mission is to address the need for well educated and certified information security and e-business practitioners. EC-Council is a global, member based organization comprised of hundreds of industry and subject matter experts all working together to set the standards and raise the bar in Information Security certification and education. EC-Council certifications are viewed as the essential certifications needed where standard configuration and security policy courses fall short. Providing a true, hands-on, tactical approach to security, individuals armed with the knowledge disseminated by EC-Council programs are securing networks around the world and beating the hackers at their own game. The Solution: EC-Council Press The EC-Council | Press marks an innovation in academic text books and courses of study in information security, computer forensics, disaster recovery, and end-user security. By repurposing the essential content of EC-Council’s world class professional certification programs to fit academic programs, the EC-Council | Press was formed. With 8 Full Series, comprised of 27 different books, the EC-Council | Press is set to revolutionize global information security programs and ultimately create a new breed of practitioners capable of combating this growing epidemic of cybercrime and the rising threat of cyber war. This Certification: C|EH – Certified Ethical Hacker Certified Ethical Hacker is a certification...

Words: 61838 - Pages: 248

Free Essay

Test2

...62118 0/nm 1/n1 2/nm 3/nm 4/nm 5/nm 6/nm 7/nm 8/nm 9/nm 1990s 0th/pt 1st/p 1th/tc 2nd/p 2th/tc 3rd/p 3th/tc 4th/pt 5th/pt 6th/pt 7th/pt 8th/pt 9th/pt 0s/pt a A AA AAA Aachen/M aardvark/SM Aaren/M Aarhus/M Aarika/M Aaron/M AB aback abacus/SM abaft Abagael/M Abagail/M abalone/SM abandoner/M abandon/LGDRS abandonment/SM abase/LGDSR abasement/S abaser/M abashed/UY abashment/MS abash/SDLG abate/DSRLG abated/U abatement/MS abater/M abattoir/SM Abba/M Abbe/M abbé/S abbess/SM Abbey/M abbey/MS Abbie/M Abbi/M Abbot/M abbot/MS Abbott/M abbr abbrev abbreviated/UA abbreviates/A abbreviate/XDSNG abbreviating/A abbreviation/M Abbye/M Abby/M ABC/M Abdel/M abdicate/NGDSX abdication/M abdomen/SM abdominal/YS abduct/DGS abduction/SM abductor/SM Abdul/M ab/DY abeam Abelard/M Abel/M Abelson/M Abe/M Aberdeen/M Abernathy/M aberrant/YS aberrational aberration/SM abet/S abetted abetting abettor/SM Abeu/M abeyance/MS abeyant Abey/M abhorred abhorrence/MS abhorrent/Y abhorrer/M abhorring abhor/S abidance/MS abide/JGSR abider/M abiding/Y Abidjan/M Abie/M Abigael/M Abigail/M Abigale/M Abilene/M ability/IMES abjection/MS abjectness/SM abject/SGPDY abjuration/SM abjuratory abjurer/M abjure/ZGSRD ablate/VGNSDX ablation/M ablative/SY ablaze abler/E ables/E ablest able/U abloom ablution/MS Ab/M ABM/S abnegate/NGSDX abnegation/M Abner/M abnormality/SM abnormal/SY aboard ...

Words: 113589 - Pages: 455