eMule

EMule ( IPA:. / i ː mju ː ɫ /, English mule ' mule ' ) is a widely used and free file sharing client for the eDonkey2000 and Kad network. It was developed as an alternative to the original, now discontinued eDonkey client and adds a number of capabilities. eMule is now by far the most common client for the eDonkey2000 network.

  • 5.1 Modifications and variations
  • 5.2 Malignant Mods

Properties

EMule is free and open source, further, it contains no ads and spyware. It will be used to locate other clients multiple protocols ( ed2k, source exchange, Kad ). An internal credit system provides for favorable treatment from clients to upload large amounts of data, so that they move faster in its own queue.

EMule has a built-in data compression between eMule and compatible client. Peer cache is supported, so it is Internet providers possible to reduce their caused eMule data transfer rate by caching.

The " intelligent error correction " (Intelligent Corruption Handling, or " ME" ), the eMule the original eDonkey client also has advance has been in time by the better " Advanced Intelligent error correction " ( Advanced Intelligent Corruption Handling, short AICH ) replaced. This improved version can now make broken file segments as early as 180 KB in size and save undamaged parts. Genuine eDonkey client, the entire chunk had to be reloaded ( 9.28 MB ). Furthermore, the eDonkey download links can be supplemented with an additional AICH hash, which can preemptively protect against defective data.

With the preview feature videos and archives can be viewed before they were fully downloaded.

It is possible to categorize the downloaded files and distribute them in different folders. Files can also be assigned different priorities in both the Upload Download as. The use of complex Boolean queries are supported.

EMule has a built-in IRC client. It uses the free SMIRC implementation.

One can by web interface from any computer ( or handheld ) for remote control eMule with access to the network or Internet connection from.

By creating " collections" it is possible to find contiguous files on the network. The folder with unfinished (temporary) files take up much space, usually more than, for example, formerly of eDonkey, and it may happen due to the functioning of eMule that one of the original size corresponding temporary file is created, even if only a few kilobytes are downloaded.

With version 0.47a following functions have been added:

Files up to 256 GB (previously 4GB ) are supported. There are advanced search options, improved proxy support and support on the server side stored file reviews. Clients that send spam messages are automatically banned. eMule 0.47a is already fundamentally Kad 2.0 -capable, full activation was only in later versions; the "old" Kad -1.0- net is no longer supported since version 0.50a.

As of version 0.47b " obfuscation " (protocol obfuscation ) in the eDonkey2000 network is possible. An obfuscation into the Kademlia network was completely added from version 0.49a. This can providers and / or network administrators complicate the detection of eMule traffic, thus preventing countermeasures policy. Contrary extensive assumptions no greater anonymity is achieved by. Under certain circumstances, the protocol encryption is expressed even in a slightly higher use of the transmission rate (" overhead" ).

History

The roots of eMule can be traced back to May 13, 2002, when Hendrik Breitkreuz was dissatisfied with the original eDonkey2000 client and therefore decided to develop a better one. The first official version ( 0.02) was provided as source code on SourceForge to download on 6 July 2002 and there is still available. Meanwhile Breitkreuz has withdrawn from the public development, supports the project but still.

Since eMule was released from the beginning with the source code, it was not long until the first modifications ( mods ) appeared. These extend eMule to many features that have been partially incorporated in the official eMule versions. As with rudimentary programming skills the typical eDonkey download restriction could be undermined, eMule, was in the early days often than leechers client. To this counter was added in version 0.19a dated 14 September 2002, a credit system. Credit system here means that one is advancing more rapidly in the queue of another user, the more data it has already sent to him. Private loans can not be manipulated, as they are stored with the other users.

Function

EMule is based on the eDonkey2000 server-based platform, is programmed in Visual C and makes use of the Microsoft Foundation Classes. The client has additional search algorithms for sources such as the source exchange and over the serverless Kad, based on the Kademlia algorithm.

The majority of eMule users with a server and thus the eD2k network ( eD2k stands for eDonkey2000 ) connected. The most relevant server indexes all shared files from a connected client. Ask another client for a specific file, the server delivers him known ( connected ) clients that offer this file. The contact and the download are then made directly from client to client without the server (except LowID ). In addition, eMule asks every server in the server list for sources from not only the connected. Contrary to popular opinion, it is therefore also irrelevant, is connected to which server the client, only a high load on the server may delay the delivery of the sources. The server method is indeed the fastest and requires a low transmission rate, but provides the fewest sources. Also all clients are subject to the rules of the server to which they are connected: Mostly ad-supported, server operators often limit the maximum number of shared files, whereby the data transfer rate for more registered users instead of as many files is used, resulting in the sense of the exchange program absurdity.

The servers are used only for finding the initial sources, the majority finds eMule, by exchanging resources with other clients. Download as client "A" and "B" the same files down, can "A" to " B" inquire what other clients he knows that also invite and offer this file. While this method produces more overhead than to get notified of a server, the sources, but it is now regarded as indispensable.

In addition to server and source exchange there is a third way to get to sources. Since in case of failure of many large server and the source exchange would not work properly ( there are a few sources are only used to exchange at all with each other can ), Kademlia has been added as a serverless network. There are no special server anymore, but each client is also at the same time server and works searches from other clients. The advantage is that the network is no longer dependent on some server operators, but the additional tasks some data transfer rate cost on each client (usually about 1 kB / s respectively for upload and download ). Kademlia is usually also sources that remain undetected by the server and source exchange.

LowID

Normally, eMule contacted by a source directly and asking for a download place; However, this is not possible if the client has a LowID. The ID is determined normally attempts from the server after connecting, the client contact ( in the Kad network performs this task any client ) directly. If this fails because the client is, for example, behind a firewall or a router that does not pass the data on the port directly to eMule, receives an LowID. In this case, the contact must be made through an intermediary, whose role in the eD2k network, the server and the Kad network is a contactable client, called the buddy accepts. eMule tells the server / buddy with that it wants to download from a LowID client, who shall transmit this information to the affiliated LowID client, which in turn then contacted eMule purpose of the actual data transmission.

Since a LowID client can not be contacted from the outside, LowID clients can not load each other. In addition, the mediation of the server / Buddy load caused on this, which is why eMule should be reachable from the outside if possible. LowID is therefore not invented by the programmer to punish certain users, but a technical condition for this user at all can participate in the network.

Some modifications such as eMule NeoMule use similar techniques such as Skype, to circumvent the technical limitation that LowID clients no other LowID clients can contact you.

Number of users

According slyck.com the eDonkey2000 network counted just over 3 million users in May 2006. Other sources gave in May 2007 even more than 4.5 million.

Since publication of the eMule client at SourceForge, the program was from there over 650 million downloads (as of September 2012) and finished in the top spot among all long on SourceForge listed open-source programs.

Client software

The original client for Microsoft Windows is eMule. This is updated at irregular intervals since 2002.

Modifications and variations

It is important to distinguish between eMule mods and eMule Forks: A Mod differs comparatively little from the original, while a fork is a completely independent development, which is developed independently of the eMule main code.

Such mods there, also because of the high prevalence of eMule, in the meantime unmanageable number. Some of them are optimized for certain parts of eD2K-/KAD-Netzes; so the modification Zperm for example, to efficiently distribute individual files is specialized.

Platform-independent variations, some of which are based on current eMule Code, include aMule and xMule. Both are run not only on Windows but also on other operating systems like Linux or Mac OS.

Furthermore, some of Forks, the most well known is eMule Plus exist. This version is based on the outdated source code of eMule 0.30 but will be updated regularly. A support for serverless Kademlia network it does not offer, however.

Malignant mods

The open development eMule attracted not only programmers who were looking to make improvements, but also those who want to harm the network or it took into account that will hurt him in order to accelerate their own download. Ranging from modifications that behave unfairly by denying the other network subscribers upload or distribute it unfair to pay on commercial modifications that force the user to use, to modifications that interfere with targeted the network and for example, defective data distribute, the range extends. It has become a habit to speak, regardless of the manner in which they damage the network with such modifications of " leechers ". Many programmers " benign " mods have made ​​it their task to tackle it by users of such " leechers " mods are detected and blocked. To implement this, there are several different approaches that are being discussed even controversial even among the Modentwicklern.

250915
de