Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 History  





2 Design  





3 Protocol features  





4 Differences from gnutella  



4.1  Protocol  





4.2  Search algorithm  





4.3  Terminology  







5 Clients  



5.1  List  





5.2  Comparison  







6 See also  





7 References  





8 External links  














Gnutella2






Deutsch
Español

Italiano
Polski
Português
Русский
 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


Part of a serieson

File sharing

  • Online video platform
  • Peer to peer
  • Usenet
  • Web hosting
  • WebRTC
  • XDCC
  • Dailymotion
  • PeerTube
  • Putlocker
  • YouTube
  • Demonoid
  • ExtraTorrent
  • EZTV
  • isoHunt
  • FitGirl Repacks
  • KickassTorrents
  • Nyaa Torrents
  • RARBG
  • Rutracker.org
  • Tamil Rockers
  • The Pirate Bay
  • YIFY
  • YourBittorrent
  • Internet Archive
  • Library Genesis
  • Sci-Hub
  • Direct Connect
  • eDonkey
  • Gnutella
  • Gnutella2
  • Hyphanet
  • I2P
  • Soulseek
  • DC++
  • eMule
  • Filetopia
  • μTorrent
  • OnionShare
  • qBittorrent
  • Shareaza
  • Transmission
  • Tribler
  • Vuze
  • WinMX
  • Kodi
  • Popcorn Time
  • Torrents-Time
  • Darknet
  • Friend-to-friend
  • Private P2P
  • Proxy server
  • Seedbox
  • VPN
  • Legality
  • BitTorrent issues
  • Japan
  • Singapore
  • UK
  • USA
  • Comparison of BitTorrent sites
  • Comparison of eDonkey software
  • Comparison of Internet Relay Chat clients
  • Comparison of Usenet newsreaders
  • t
  • e
  • Gnutella2, often referred to as G2, is a peer-to-peer protocol developed mainly by Michael Stokes and released in 2002.

    While inspired by the gnutella protocol, G2 shares little of its design with the exception of its connection handshake and download mechanics.[1]

    G2 adopts an extensible binary packet format and an entirely new search algorithm.

    Furthermore, G2 has a related (but significantly different) network topology and an improved metadata system, which helps effectively to reduce fake files, such as viruses, on the network.

    History[edit]

    In November 2002, Michael Stokes announced the Gnutella2 protocol to the Gnutella Developers Forum. While some thought the goals stated for Gnutella2 are primarily to make a clean break with the gnutella 0.6 protocol and start over, so that some of gnutella's less clean parts would be done more elegantly and, in general, be impressive and desirable; other developers, primarily those of LimeWire and BearShare, thought it to be a "cheap publicity stunt" and discounted technical merits. Some still refuse to refer to the network as "Gnutella2", and instead, refer to it as "Mike's Protocol" ("MP").[2]

    The Gnutella2 protocol still uses the old "GNUTELLA CONNECT/0.6" handshake string for its connections[1] as defined in the gnutella 0.6 specifications. This backwardly compatible handshake method was criticized by the Gnutella Developers Forum as an attempt to use the gnutella network for bootstrapping the new, unrelated network, while proponents of the network claimed that its intent was to remain backwards-compatible with gnutella and to allow current gnutella clients to add Gnutella2 at their leisure.

    With the developers entrenched in their positions, a flame war soon erupted, further cementing both sides' resolve.[3][4][5][6]

    The draft specifications were released on March 26, 2003, and more detailed specifications soon followed. G2 is not supported by many of the "old" gnutella network clients, however, many Gnutella2 clients still also connect to gnutella. Many Gnutella2 proponents claim that this is because of political reasons, while gnutella supporters claim that the drastic changes don't have enough merit to outweigh the cost of deep rewrites.[7]

    Design[edit]

    Gnutella2 divides nodes into two groups: Leaves and Hubs. Most Leaves maintain two connections to Hubs,[8] while Hubs accept hundreds of Leaf connections, and an average of 7 connections to other Hubs. When a search is initiated, the node obtains a list of Hubs, if needed, and contacts the Hubs in the list, noting which have been searched, until the list is exhausted or a predefined search limit has been reached. This allows a user to find a popular file easily without loading the network, while, theoretically, maintaining the ability for a user to find a single file located anywhere on the network.

    Hubs index what files a Leaf has by means of a Query Routing Table, which is filled with single bit entries of hashesofkeywords, which the Leaf uploads to the Hub, and which the Hub then combines with all the hash tables its Leaves have sent, it in order to create a version to send to their neighboring Hubs. This allows for Hubs to reduce bandwidth greatly by simply not forwarding queries to Leaves and neighboring Hubs, if the entries which match the search are not found in the routing tables.

    Gnutella2 relies extensively on UDP, rather than TCP, for searches. The overhead of setting up a TCP connection would make a random walk search system, requiring the contacting of large numbers of nodes with small volumes of data, unworkable. However, UDP is not without its own drawbacks. Because UDP is connectionless, there is no standard method to inform the sending client that a message was received, and so if the packet is lost, there is no way to know. Because of this, UDP packets in Gnutella2 have a flag to enable a reliability setting. When an UDP packet with enabled reliability flag is received, the client will respond with an acknowledge packet to inform the sending client that their packet arrived at its destination. If the acknowledge packet is not sent, the reliable packet will be retransmitted in an attempt to ensure delivery. Low importance packets, which do not have the flag enabled, do not require an acknowledge packet, reducing reliability, but also reducing overhead, as no acknowledge packet needs to be sent and waited upon.

    Protocol features[edit]

    Gnutella2 has an extensible binary packet format, comparable to an XML document tree, which was conceived as an answer for some of gnutella's less elegant parts. The packet format was designed so that future network improvements and individual vendor features could be added without worry of causing bugs in other clients on the network.[9]

    For the purpose file identification and secure integrity check of files it employs SHA-1 hashes. To allow for a file to be reliably downloaded in parallel from multiple sources, as well as to allow for the reliable uploading of parts while the file is still being downloaded (swarming), Tiger tree hashes are used.[10]

    To create a more robust and complete system for searching, Gnutella2 also has a metadata system for more complete labeling, rating, and quality information to be given in the search results than would simply be gathered by the file names.[11] Nodes can even share this information after they have deleted the file, allowing users to mark viruses and worms on the network, without requiring them to keep a copy.

    Gnutella2 also utilizes compression in its network connections to reduce the bandwidth used by the network.[10]

    Shareaza has the additional feature to request previews of images and videos though only FilesScope takes limited advantage of this.

    gtk-gnutella extended the protocol to further reduce the gap between Gnutella and G2. In particular, the semi-reliable UDP layer was enhanced to add cumulative and extended acknowledgments in a way that is backward compatible with legacy G2 clients.[12] Further extensions include the "A" string in /Q2/I [13] and the introduction of /QH2/H/ALT, /QH2/H/PART/MT, /QH2/HN, /QH2/BH and /QH2/G1 in the query hits.[14]

    Differences from gnutella[edit]

    Overall, the two networks are fairly similar, with the primary differences being in the packet format and the search methodology.

    Protocol[edit]

    Gnutella's packet format has been criticized because it was not originally designed with extensibility in mind, and has had many additions over the years, leaving the packet structure cluttered and inefficient.[15] Gnutella2 learned from this, and aside from having many of the added features of gnutella standard in Gnutella2, designed in future extensibility from the start.

    Search algorithm[edit]

    While gnutella uses a query flooding method of searching, Gnutella2 uses a random walk system, where a searching node gathers a list of Hubs and contacts them directly, one at a time. However, as Hub organize themselves in, so called, "Hub clusters", where each Hub mirrors the information stored by its neighbors, the Leaf is returned the information of the entire Hub cluster (usually 7 Hubs). This has several advantages over the gnutella's query flooding system. It is more efficient, as continuing a search does not increase the network traffic exponentially, queries are not routed through as many nodes, and it increases the granularity of a search, allowing a client to stop, once a pre-defined threshold of results has been obtained, more effectively than in gnutella. However, the walk system also increases the complexity of the network and the network maintenance and management required, as well as requiring safeguards to prevent a malicious attacker from using the network for denial-of-service attacks.

    Terminology[edit]

    There is also a difference in terminology: while the more capable nodes, which are used to condense the network, are referred to as Ultrapeers in gnutella, they are called Hubs in Gnutella2, and they are also used slightly differently in topology. In gnutella, the Ultrapeers generally maintain as many leaves as peer connections, while Gnutella2 Hubs maintain far more leaves, and fewer peer (Hub-to-Hub) connections. The reason for this is that the search methods of the various networks have different optimum topologies.

    Clients[edit]

    List[edit]

    Free software Gnutella2 clients include:

    Proprietary software implementations include:

    Comparison[edit]

    The following table compares general and technical information for a number of available applications supporting the G2 network.

    Client

    Chat

    Handles big files (>4 GB)

    UKHL[20]

    Unicode

    UPnP port mapping

    NAT traversal

    Remote preview

    Ability to search with hashes

    Hub modus

    Spyware/ Adware/ Malware-free

    Other networks

    Based on

    OS

    Other

    Foxy

    Yes

    No

    No

    Yes

    Yes

    No

    No

    Yes

    Foxy only

    No

    GnucDNA

    Cross-platform

    -

    FileScope

    Yes

    No

    No

    No

    No

    No

    Yes

    Yes

    Yes

    Yes

    gnutella,

    eD2k, OpenNap

    -

    Windows[21]

    Development has ended in 2014.[22]

    Gnucleus

    No

    No

    No

    No

    No

    No

    No

    Yes

    No

    Yes

    gnutella

    GnucDNA

    Windows

    -

    gtk-gnutella

    No

    Yes

    No

    Yes

    Yes

    Yes

    No

    Yes

    No

    Yes

    gnutella

    -

    Cross-platform

    -

    Morpheus

    Yes

    No

    No

    No

    Yes

    No

    No

    Yes

    No

    No

    gnutella,

    NEOnet

    GnucDNA

    Windows

    Development and hosting of the client has been stopped

    Shareaza

    Yes

    Yes

    Yes

    Yes

    Yes

    No

    Yes

    Yes

    Yes

    Yes

    gnutella,

    eD2k, BitTorrent

    -

    Windows

    Includes IRC support

    See also[edit]

    References[edit]

    1. ^ a b "Developer discussion of similarities between Gnutella and Gnutella2". The Gnutella Developer Forum. Archived from the original on 2023-01-17. Retrieved 2006-05-10.
  • ^ "GDF Discussion on the Gnutella2 name". The Gnutella Developer Forum. Archived from the original on 2023-01-17. Retrieved 2006-05-10.
  • ^ "Part of the Gnutella/Gnutella2 Flame War (1)". The Gnutella Developer Forum. Archived from the original on 2009-02-12. Retrieved 2006-08-06.
  • ^ "Part of the Gnutella/Gnutella2 Flame War (2)". The Gnutella Developer Forum. Archived from the original on 2023-01-17. Retrieved 2006-08-06.
  • ^ "Part of the Gnutella/Gnutella2 Flame War (3)". The Gnutella Developer Forum. Archived from the original on 2023-01-17. Retrieved 2006-08-06.
  • ^ "Part of the Gnutella/Gnutella2 Flame War (4)". The Gnutella Developer Forum. Archived from the original on 2023-01-17. Retrieved 2006-08-06.
  • ^ "Developer discussion on migration to Gnutella2". The Gnutella Developer Forum. Archived from the original on 2023-01-17. Retrieved 2006-05-10.
  • ^ "Gnutella2 Network history". Trillinux crawler (G2paranha). Archived from the original on 2009-05-15. Retrieved 2009-04-12.
  • ^ "Packet Structure". Gnutella2 Wiki. Archived from the original on 2007-12-19. Retrieved 2007-11-07.
  • ^ a b "Gnutella2 Standard". Gnutella2 wiki. Archived from the original on 2007-12-19. Retrieved 2007-11-07.
  • ^ "Simple Query Language and Metadata". Gnutella2 Wiki. Archived from the original on 2007-12-19. Retrieved 2007-11-07.
  • ^ "UDP Transceiver - Gnutella2". G2.doxu.org. Archived from the original on 2014-07-19. Retrieved 2014-08-06.
  • ^ "Q2 - Gnutella2". G2.doxu.org. 2014-02-25. Archived from the original on 2014-07-14. Retrieved 2014-08-06.
  • ^ "QH2 - Gnutella2". G2.doxu.org. 2014-03-12. Archived from the original on 2013-12-13. Retrieved 2014-08-06.
  • ^ "Developer discussion of Gnutella and Gnutella2 packet formats". The Gnutella Developer Forum. Archived from the original on 2023-01-17. Retrieved 2006-05-15.
  • ^ "Adagio download | SourceForge.net". Archived from the original on 2016-11-12. Retrieved 2016-11-11.
  • ^ "gtk-gnutella - The Graphical Unix Gnutella Client". Gtk-gnutella.sourceforge.net. Archived from the original on 2005-07-08. Retrieved 2014-08-06.
  • ^ "OtherNetworksSupported - MLDonkey". mldonkey.sourceforge.net. Archived from the original on 2016-11-12. Retrieved 2016-11-11.
  • ^ "Shareaza network share on the G2 network". Trillinux crawler (G2paranha). Archived from the original on 2009-01-05. Retrieved 2008-09-18.
  • ^ UKHL = UDP Known Hub List
  • ^ "FileScope website: Statement about cross-platforum compatibility". FileScope. Archived from the original on 2008-08-28. Retrieved 2008-08-22.
  • ^ "FileScope". SourceForge. Archived from the original on 2021-06-25. Retrieved 2021-06-25.
  • External links[edit]

    Networks,
    protocols

    Centralized

  • Soribada
  • Soulseek
  • Decentralized

  • DAT
  • eDonkey
  • FastTrack
  • Fopnu
  • Freenet
  • GNUnet
  • Gnutella
  • Gnutella2
  • I2P
  • IPFS
  • Kad
  • LBRY
  • OpenFT
  • OnionShare
  • Perfect Dark
  • Retroshare
  • Share
  • Tribler
  • WebTorrent
  • WinMX
  • Winny
  • ZeroNet
  • Historic

  • CuteMX
  • Kazaa
  • LimeWire
  • Morpheus
  • Napster
  • Scour
  • WASTE
  • Comparisons
    ofclients

  • BitTorrent
  • Direct Connect
  • eDonkey
  • Gnutella
  • Gnutella2
  • WebTorrent
  • Hyperlinks

  • Magnet
  • Metalink
  • Uses

  • Broadcatching
  • Disk sharing
  • Game and video sharing
  • Image sharing
  • Music sharing
  • Peercasting
  • Seedboxes
  • Sharing software
  • Web hosting (Freesite, IPFS, ZeroNet)
  • Legal aspects
  • Concepts

    Privacy

  • Darknet
  • Darkweb
  • Friend-to-friend
  • Open music model
  • Private P2P
  • Tor
  • Internal
    technologies

  • Merkle tree
  • NAT traversal
  • Peer exchange
  • BitTorrent protocol encryption
  • SHA-1
  • SHA-2
  • Super-seeding
  • BitTorrent tracker
  • UDP hole punching
  • Micro Transport Protocol
  • Developer

    Technology

  • Tiger Tree hash
  • Magnet URI scheme
  • SHA-1
  • Terminology

  • Node
  • Overlay network
  • TCP
  • UDP
  • Software

  • Gnucleus
  • Morpheus
  • Shareaza
  • All clients (comparison)

  • Retrieved from "https://en.wikipedia.org/w/index.php?title=Gnutella2&oldid=1220287747"

    Categories: 
    Gnutella2
    File sharing networks
    Hidden categories: 
    All articles with unsourced statements
    Articles with unsourced statements from April 2009
     



    This page was last edited on 22 April 2024, at 21:27 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki