Teknik Informatika    
   
Daftar Isi
(Sebelumnya) Advanced Continuous Simulation ...Advanced Encryption Standard (Berikutnya)

Advanced Direct Connect

Advanced Direct Connect
Protocol Version: 1.0.2
Extension Version 1.0.7
http://www.adc.sourceforge.net
Protocol
BASE · TIGR · BZIP · ZLIB ·
Extensions
PING · TS · DFAV · UCMD · BLOM · NATT · RF · QP · PFSR · LC · KEYP · SUDP · TYPE · FEED · SEGA · FO · FS · ADCS

Advanced Direct Connect (ADC) is a peer-to-peer file sharing and chat protocol, using the same topology, concepts and terminology as the Direct Connect (DC) protocol.

ADC is structured around clients that connect to a central hub, where the clients (users) can chat and download files from other clients (users). The hub provides routing between clients for chat, searches and requests for connections. The actual file transfers are between clients.

The protocol itself is split in two parts; a base protocol that every client and hub respectively must follow and extensions that are optional. The protocols allow signalling of protocol features (such as bloom filters), and messages can be constructed to only be routed to those who support that particular feature.

Each hub has their own rules and are commonly governed by hub operators.[1] Hubs may define different capabilities for hub operators. The hubs themselves do not regulate discussion and files, but the hub operators. The hub regulate minimum share and maximum amount of simultaneous hubs; things that are sent by the client, rather than the user.

Lists of hubs [2] exist where a hub's name, description, address and rules are specified. With the hub list, users can choose hubs that are similar according to the user's liking of discussion topics and files.

The peer-to-peer part of the protocol is based on a concept of "slots" [3] (similar to number of open positions for a job). These slots denote the number of people that are allowed to download from a user at any time. The slots are controlled by the user of respective client.

ADC require that all text must be sent in UTF-8, which means that users with different system encoding (say, Russian and Chinese) are able to chat with respective native characters.

The protocol natively supports IPv6.

There are two modes a user can be in: "active" or "passive". Clients in active mode can download from anyone else on the network. Passive mode users can only download from active users. Passive clients will be sent search results through the hub, while active clients will receive the results directly. An active searcher will receive (at most) 10 results per user and a passive searcher will receive (at most) 5 results per user. NAT traversal exist as a protocol extension,[4] which allow passive users to connect to other passive users.

The base protocol does not require encryption, but extensions exist to provide encryption with TLS.[5]

Files in client connections are identified by their hash, most commonly the Tiger Tree Hash. The hash algorithm is negotiated with the hub and used throughout the client-hub session, as well as subsequent client-client connections.

"Advanced Direct Connect" is not officially an acronym for "ADC".[6]

Contents

History

ADC was created to allow an extensible protocol and to address some shortcomings of the DC protocol. It was initiated by Jacek Sieka, under the influence of Jan Vidar Krey's DCTNG draft.[7] The first revision of ADC came in 2004 and the first official version in 2007-12-01.

Protocol

The ADC protocol is a text-based protocol, where commands and their information are sent in clear text, except during password negotiation. The client-server (as well as client-client, where one acts as a "server") aspect of the protocol stipulates that the client speak first when a connection has been made. For example, when a client connects to a hub's socket, the client is the first to talk to the hub.

The protocol requires that all text must be sent as UTF-8 encoded Unicode, normalized in form C.

There are no port defaults, for hubs or clients.

Hub addresses are in the following form: adc://example.com:411, where 411 is the port.

During hub-client protocol information exchange, the client offers a set of hashes it supports. The hub will select one of these hashes, and that hash will be used throughout the hub-client session. If the hub deems that the client doesn't support an (arbitrary) appropriate hash set, an error is raised.

The global identification scheme is based on the hash set producing two end-hashes, where one of them depends on the output of the other. During hub-client information exchange, the client will send these end-hashes, encoded with base32, which the hub will confirm to match. One of these base32 encoded hashes will be further sent to other clients in the network. The global identification scheme is this last string. The client may change its end-hashes on a hub-to-hub basis.

Each user, during a hub session, is assigned a hash that only lasts that particular session. This hash will be used for all client references in that hub. There is no dependency on nicks.

Each client information notification is incrementally sent.

An incoming request for a client-client connection is linked to an actual connection, with the use of a token.

Searches use a token, as well, to identify each result of a search.

There is no out-of-the-box ability for a client to kick or redirect another client from a hub. The hub, however, can kick and redirect arbitrarily. The hub can also require that all other clients in the hub must terminate their transfers with the kicked/redirected client. If a client is redirected to another hub, the redirecting client must use a referrer, similar to the HTTP referrer. The kicked/redirected client is not required to receive a notification message.

The peer-to-peer part of the protocol is based on a concept of "slots" (similar to number of open positions for a job). These slots denote the number of people that are allowed to download from a user at any time. These slots are controlled by the client. Automatic slot allocation is supported by the protocol.

The token in the client-client connection decides who should be allowed to download first.

Downloads are transported using TCP. Searches can be transported using TCP or UDP.

There are two modes a user can be in: active or passive. Clients in active mode can download from anyone else on the network. Passive mode users can only download from active users. Passive clients will be sent search results through the hub, while active clients will receive the results directly. An active searcher will receive (at most) 10 results per user and a passive searcher will receive (at most) 5 results per user.

An active client has a listening port for TCP and another for UDP, though the ports don't depend on each other.

Protocol delimiters are '\n' and ' ' (space). The character '' is used as an escape sequence. Allowed escape sequences are "\n" (new line), "\s" (space) and "" (backslash).

The protocol allows for extensions such as compression with bzip2 or encryption with TLS.[8] While the protocol does not mandate that these extensions be implemented, hubs may require them.

Advanced Direct Connect is a next-generation peer-to-peer file-sharing protocol. This page compares the features of a number of software implementations of the protocol[9] .

Hub software

General

ADC hubFOSSSoftware licenseActive
ADCH++YesGNU GPLYes
ADCH++ GUIYesGNU GPLNo
DSHubYesGNU GPLNo
FlexHubYesAGPLYes
LuadchYesMITNo
NexthubYesMITNo
uhubYesGNU GPLYes
ErlHubYesGNU GPL?
QhubYesGNU GPLNo
Starlet ADC HubYesN/AYes
Starhub???
RusHubYesGNU GPLYes
ADC hubFOSSSoftware licenseActive

[10] .

Operating system support

ADC hubWindowsLinuxOS XOther
ADCH++YesYesNoNo
ADCH++ GUIYesYesNoAny Python enabled platform
DSHubYesYesYesAny Java enabled platform
FlexHubYesYesNoNo
LuadchYesYes?BSD
NexthubYes?NoAny C# enabled platform
uhubYesYesYesBSD, Haiku, OpenWrt, Solaris
ErlhubYesYesYesAny Erlang enabled platform
Qhub????
Starlet ADC HubNoNoNoOpenVMS
StarhubYesYesYesAny Java enabled platform
RusHubYesYesYesFreeBSD, Solaris
ADC hubWindowsLinuxOS XOther

[11] .

Interface and programming

ADC hubGUI
CLI
Other
Programming language
Based on
ADCH++NoYes?C++, Lua, Python, Ruby 
ADCH++ GUIYesNo?C++, PythonADCH++
DSHubYesYes?Java, Python 
FlexHubPlannedYes?Lua 
LuadchNoYes?Lua 
NexthubYesNoNoC-Sharp 
uhubNoYes?C 
Erlhub???Erlang 
Qhub???? 
Starlet ADC HubNoYesNoC 
StarHubYes??Java 
RusHubNoYesNoC++ 
ADC hubGUICLIOtherProgramming languageBased on

[12]

Features

ADC hubEncryptionIPv6PluginHash algorithmsBloom filterADC supportOther
ADCH++YesYesLua, Python, RubyTiger tree hashYesTIGR, PING, ADCS 
ADCH++ GUIYesNoPythonTiger tree hashYesTIGR, PING, ADCS 
DSHubYesNoJava, PythonTiger tree hashNoTIGR, PING, ADCS 
FLexHubLinux onlyNoNoTiger tree hashNoTIGR, PING, ADCS 
LuadchYesNoLuaTiger tree hashNoTIGR, PING, ADCS 
NexthubNoNoC#Tiger tree hashNoTIGR, ADCS 
uhubYesYesCTiger tree hashNoTIGR, PING, ADCS 
Qhub???Tiger tree hashNoTIGR 
Starlet ADC HubNoNoNoTiger tree hashNoTIGR 
Starhub???Tiger tree hashNoTIGR 
RusHubNo?NoTiger tree hashNoTIGR 
ADC hubEncryptionIPv6PluginHash algorithmsBloom filterADC supportOther

[13] .

Client software

General

ADC clientFOSSSoftware licenseActive
AirDC++YesGNU GPLYes
ApexDC++YesGNU GPLYes
DC++YesGNU GPLYes
jucyYesBSDYes
LinuxDC++YesGNU GPLYes
EiskaltDC++YesGNU GPLYes
FlylinkDC++YesGNU GPLYes
RSX++YesGNU GPLYes
TkDC++YesGNU GPLYes
StrongDC++YesGNU GPLYes
ncdcYesMITYes
ADC clientFOSSSoftware licenseActive

Operating system support

ADC clientWindowsLinuxOS XBSDHaiku
AirDC++YesNoNoNoNo
ApexDC++YesNoNoNoNo
DC++YesNoNoNoNo
jucyYesYesYesNoNo
LinuxDC++NoYesNoYesNo
EiskaltDC++YesYesYesYesYes
FlylinkDC++YesNoNoNoNo
RSX++YesNoNoNoNo
TKDC++YesNoNoNoNo
StrongDC++YesNoNoNoNo
ncdcNoYesYesYes?
ADC clientWindowsLinuxOS XBSDHaiku

[14] .

Interface and programming

ADC clientGUICLIOtherProgramming languageBased on
AirDC++YesNoNoC++StrongDC++
ApexDC++YesNoNoC++, LuaStrongDC++
DC++YesNoNoC++ 
JucyYesNoNoJava 
LinuxDC++YesNoNoC++DC++
EiskaltDC++YesYesNoC++, Lua, QtScript, QMLDC++, FreeDC++
FlylinkDC++YesNoWebUIC++StrongDC++, DC++, ApexDC speed mode
RSX++YesNoNoC++, LuaStrongDC++
TKDC++YesNoNoC++, LuaStrongDC++, DC++
StrongDC++YesNoNoC++DC++
ncdcNoYesNoC 
ADC clientGUICLIOtherProgramming languageBased on

[15] .

Features

ADC clientMagnet URIUPnPNAT traversalDHTEncryptionIPv6PluginProxyHash algorithmsProtocol supportNMDC compatibleOther
AirDC++YesYesYesNoYesYesNoYesTiger tree hashTIGR, ADCS, UCMD,NATT, SEGA, PFSR, KEYP, PBD1, UBN1, MCN1, BLOM, SUDP, FO, QPYes 
ApexDC++YesYesYesYesYesNoC++, LuaYesTiger tree hashInherits from StrongDC++No 
DC++YesYesYesNoYesYesNoYesTiger tree hashTIGR, ADCS, UCMD, BLOM, NATT, SEGANo 
jucyYesYesNoNoYesYesEclipse RCPYesTiger tree hashTIGR, ADCS, KEYP, SUDP, BLOM, UCMDYes 
LinuxDC++YesYesNoNoYesNoNoYesTiger tree hashInherits from DC++No 
EiskaltDC++YesYesYesYesYesNoLua, QtScript, QMLYesTiger tree hashTIGR, ADCS, UCMD, BLOM, NATT, SEGA, PFSR, KEYP, FSYes 
FlylinkDC++YesYesYesYesYesDual stackNoYesTiger tree hashInherits from StrongDC++No 
RSX++YesYesNoYesYesNoC++, LuaYesTiger tree hashInherits from StrongDC++No 
TKDC++YesYesYesNoYesNoC++, LuaYesTiger tree hashTIGR, ADCS, UCMD, BLOM, NATT, PFSR, SEGAYes 
StrongDC++YesYesYesYesYesYesNoYesTiger tree hashTIGR, ADCS, UCMD, BLOM, NATT, PFSR, QP, SEGANo 
ncdcNoNoNoNoYesYesNoNoTiger tree hashTIGR, ADCS, KEYP, SUDPYes 
ADC clientMagnet URIUPnPNAT traversalDHTEncryptionIPv6PluginProxyHash algorithmsProtocol supportNMDC compatibleOther

[16] .

Other software

General

Other softwareSoftware typeFOSSSoftware licenseActive
ADCCoreGeneral libraryYesGNU GPLYes
DCBouncerRelayYesGNU GPLYes
DC-HublinkHub linkerYesGNU GPLNo
DCWatchHub operator helperYesGNU GPLNo
EmblaGeneral libraryYesGNU GPL?
FlowLibGeneral libraryYesGNU GPLYes
NetChatLinkHub linkerYesGNU GPLYes
SerieBotSerieBotYesGNU GPLYes
Other softwareSoftware typeFOSSSoftware licenseActive

[17] .

Operating system support

Other softwareWindowsLinuxOS XOther
ADCCoreYes??Any .NET4 enabled platform
DCBouncerYesYesNoNo
DC-HublinkYesNoNoNo
DCWatchYesYesNoNo
EmblaYesYesYesAny Java enabled platform
FlowLibYesYesYesAny C# enabled platform
NetChatLinkYesNoNoRuns under Wine
SerieBotYesYesYesAny C# enabled platform
Other softwareWindowsLinuxOS XOther

[18] .

Interface and programming

Other softwareGUICLIOtherProgramming languageBased on
ADCCoreNoNoNoC#CoreDC
DCBouncerNoYesNoC++ 
DC-HublinkYesNoNoVisual Basic 
DCWatchNoYesNoJava, LuaEmbla
EmblaNoNoNoJava 
FlowLibNoNoNoC# 
NetChatLinkYesNoNoObject Pascal (Delphi) 
ADC hubGUICLIOtherProgramming languageBased on

Features

Other softwareEncryptionIPv6Plugin, extendableHash algorithmsADC supportOther
ADCCoreYes?YesTiger tree hashTIGR, ADCS 
DCBouncerYesNoNoTiger tree hashAny clients, hubs 
DC-HublinkNoNoNoTiger tree hashTIGR 
DCWatchYes?Java, LuaTiger tree hashTIGR, ADCS 
EmblaYes?YesTiger tree hashTIGR 
FlowLibYes?YesTiger tree hashTIGR 
NetChatLinkNoNoNoTiger tree hashTIGR 
Other softwareEncryptionIPv6Plugin, extendableHash algorithmsADC supportOther

[19] .


References

  1. ^ Fredrik Ullner (March 2006). "Power + Person = Operator". DC++: Just These Guys, Ya Know? blog. http://dcpp.wordpress.com/2006/03/13/ power-person-operator/. Retrieved 2010-12-13.
  2. ^ Fredrik Ullner (January 2007). "The parts of a hub list". DC++: Just These Guys, Ya Know? blog. http://dcpp.wordpress.com/2007/01/17/ the-parts-of-a-hub-list/. Retrieved 2010-12-13.
  3. ^ Fredrik Ullner (March 2006). "Slots, slots, slots…". DC++: Just These Guys, Ya Know? blog. http://dcpp.wordpress.com/2006/03/09/ slots-slots-slots/. Retrieved 2010-12-13.
  4. ^ Fredrik Ullner (December 2010). "ADC Extensions - NATT - NAT traversal". ADC Project. http://adc.sourceforge.net/versions/A DC-EXT-1.0.6.html#_natt_nat_traversal. Retrieved 2010-12-13.
  5. ^ Fredrik Ullner (December 2010). "ADC Extensions - ADCS - Symmetrical Encryption in ADC". ADC Project. http://adc.sourceforge.net/versions/A DC-EXT-1.0.6.html#_adcs_symmetrical_e ncryption_in_adc. Retrieved 2010-12-13.
  6. ^ Fredrik Ullner (March 2007). "ADC: The run down". DC++: Just These Guys, Ya Know? blog. http://dcpp.wordpress.com/2007/03/04/ adc-the-run-down/. Retrieved 2010-12-13.
  7. ^ Jan Vidar Krey (August 2006). "ADC: Protocol simplicity". Jan Vidar Krey. http://my.opera.com/janvk/blog/show.d ml/422301. Retrieved 2006-09-23.[dead link]
  8. ^ En_Dator (March 2009). "TLS and Encryption". ADCPortal. http://www.adcportal.com/forums/viewt opic.php?f=10&t=474. Retrieved 2009-03-01.
  9. ^ "Comparison Of ADC Software". http://www.mindmap.0rg.p. http://www.mindmap.0rg.pl/?mindmap=Co mparison_of_ADC_Software. Retrieved 8 March 2013.
  10. ^ "Comparison Of ADC Software". http://www.mindmap.0rg.p. http://www.mindmap.0rg.pl/?mindmap=Co mparison_of_ADC_Software. Retrieved 8 March 2013.
  11. ^ "Comparison Of ADC Software". http://www.mindmap.0rg.p. http://www.mindmap.0rg.pl/?mindmap=Co mparison_of_ADC_Software. Retrieved 8 March 2013.
  12. ^ "Comparison Of ADC Software". http://www.mindmap.0rg.p. http://www.mindmap.0rg.pl/?mindmap=Co mparison_of_ADC_Software. Retrieved 8 March 2013.
  13. ^ "Comparison Of ADC Software". http://www.mindmap.0rg.p. http://www.mindmap.0rg.pl/?mindmap=Co mparison_of_ADC_Software. Retrieved 8 March 2013.
  14. ^ "Comparison Of ADC Software". http://www.mindmap.0rg.p. http://www.mindmap.0rg.pl/?mindmap=Co mparison_of_ADC_Software. Retrieved 8 March 2013.
  15. ^ "Comparison Of ADC Software". http://www.mindmap.0rg.p. http://www.mindmap.0rg.pl/?mindmap=Co mparison_of_ADC_Software. Retrieved 8 March 2013.
  16. ^ "Comparison Of ADC Software". http://www.mindmap.0rg.p. http://www.mindmap.0rg.pl/?mindmap=Co mparison_of_ADC_Software. Retrieved 8 March 2013.
  17. ^ "Comparison Of ADC Software". http://www.mindmap.0rg.p. http://www.mindmap.0rg.pl/?mindmap=Co mparison_of_ADC_Software. Retrieved 8 March 2013.
  18. ^ "Comparison Of ADC Software". http://www.mindmap.0rg.p. http://www.mindmap.0rg.pl/?mindmap=Co mparison_of_ADC_Software. Retrieved 8 March 2013.
  19. ^ "Comparison Of ADC Software". http://www.mindmap.0rg.p. http://www.mindmap.0rg.pl/?mindmap=Co mparison_of_ADC_Software. Retrieved 8 March 2013.

See also

  • NeoModus Direct Connect protocol (NMDC)


References


External links

(Sebelumnya) Advanced Continuous Simulation ...Advanced Encryption Standard (Berikutnya)