List of P2P protocols
Appearance
Protocols used by multiple programs
Note that the name of the protocol may also be the name of the primary or original program that uses it.
- Ares (Ares Galaxy, Warez P2P)
- Bitcoin (Bitcoin, Alt-Coins)
- BitTorrent (ABC (Yet Another BitTorrent Client), BitComet, BitSpirit, BitTornado, BitTorrent.Net, G3 Torrent, mlMac, MLdonkey, QTorrent, Shareaza, Tribler, µTorrent, Vuze (previously Azureus) etc.)
- Direct Connect (BCDC++, DC++, NeoModus Direct Connect, etc.)
- FastTrack (Grokster, iMesh, Kazaa, Morpheus, etc.)
- eDonkey (eMule, Overnet, etc.)
- Gnutella (BearShare, iMesh, Gnotella, Gnucleus, GTK-gnutella, LimeWire, Frostwire, Mactella, Shareaza, etc.)
- MANOLITO/MP2PN (Blubster, Piolet, RocketItNet)
- OpenNap (Napigator, WinMX)
- RShare (RShare software, StealthNet)
Protocols used by only one program
- 100Bao
- Aimster
- Applejuice
- Filetopia
- Freenet
- GnucleusLAN (a variant of Gnucleus)
- Goalbit
- GoBoogy
- Infinit
- KuGoo
- OpenFT (giFT)
- MUTE
- RetroShare
- Soribada
- Soulseek
- Xunlei
Programs not also listed as protocols
This section may be confusing or unclear to readers. (March 2015) |
- BearShare: Gnutella
- Blubster: MP2PN
- Gnotella: Gnutella
- Gnucleus: Gnutella
- Grokster: FastTrack
- GTK-gnutella: Gnutella
- iMesh: Gnutella, FastTrack
- Kazaa: FastTrack
- Limewire: Gnutella
- Mactella: Gnutella
- MXIE: suspect fake vendor name
- Morpheus: FastTrack
- Piolet: MP2PN
- PyGnutella: reported as fake vendor name suspected of cache poisoning[1]
- RocketItNet: MP2PN
- Shareaza: Gnutella, eDonkey, BitTorrent, HTTP, FTP
- WinMX: ONap, WPNP
- Vagaa: eDonkey, BitTorrent, (?)
See also
References
- ^ "Fake poisoning servents". www.gnutellaforums.com. Retrieved 2016-06-02.