Content deleted Content added
Sorry, some of this does not meet the necessary style to be included in an article... |
m HTTP to HTTPS for SourceForge |
||
(33 intermediate revisions by 25 users not shown) | |||
Line 1:
{{refimprove|date=June 2016}}
{{lowercase}}
In computing, '''eD2k links''' (''ed2k://'') are [[hyperlink]]s used to denote files stored on computers connected to the [[eDonkey network|eDonkey]] [[filesharing]] [[P2P network]].
Line 5 ⟶ 6:
Many programs, such as [[eMule]], [[MLDonkey]] and the original [[eDonkey2000]] client by ''[[MetaMachine]]'', which introduced the link type, as well as others using the eDonkey file sharing protocol, can be used to manage files stored in the filesharing network.
eD2k links allow a file to be identified from a link in a web browser and to be downloaded thereafter by a client like eMule, [[Shareaza]] or any other compatible software. This linking feature was one of the first [[Uniform Resource Identifier|URI]]s to be introduced in [[peer-to-peer]] file sharing, and had a vast effect on the development of the eDonkey network, as it allowed external link sites to provide verified content within the network. Nowadays, so-called [[Magnet URI scheme|Magnet links]] have replaced eD2k
eD2k links include file hashes, as these hashes can be used as a [[unique identifier]] for files within the network, so even if the linked-to file has a different name on two computers within the network, the file can be found on both of them, and file chunks can be obtained from both sources. This is done by using a [[hash function]] on the file to calculate its checksum, depending only from the file content, not from its name.
Like other URI protocols, web browsers can be configured to automatically handle ed2k URIs. After installing an [[Comparison of eDonkey software|eD2k client]], the
== File link format ==
File links are preceded with the "file" token, which indicates that this is a file link, as opposed to a <code>server</code>, <code>serverlist</code>, <code>nodelist</code> or <code>
ed2k://|file|The_Two_Towers-The_Purist_Edit-Trailer.avi|14997504|965c013e991ee246d63d45ea71954c4d|/
eD2k links can also include a reference to the [[IP address]] and port of specific clients that are known to share the linked-to file. This is done by adding a list of sources after the main part of the link, like shown in the following example:
ed2k://|file|The_Two_Towers-The_Purist_Edit-Trailer.avi|14997504|965c013e991ee246d63d45ea71954c4d|/|sources,202.89.123.6:4662|/
On eMule, the link often contains also an [[
=== eD2k hash algorithm ===
The eD2k hash function is a [[hash list|root hash]] of a list of [[MD4]] [[hash function|hashes]]
The file data is divided into full ''chunks'' of 9500 KiB (9728000 bytes) plus a remainder chunk, and a separate
This method of hashing allows the recipient to verify that a hash list corresponds to
In the past, there has been some ambiguity for files whose size is a multiple of the chunk size (9500 KiB). Old versions of some eD2k hash tools computed file hashes with an additional 0-byte chunk at the end. This is because an ambiguity of the term ''remainder chunk'' which can be interpreted as either ''the last chunk'' or a ''non-full chunk at the end''. Following the latter interpretation, some implementations added a zero byte chunk in case the last chunk of a file was a complete one. This practice is discouraged however and the first interpretation is used as a standard nowadays to prevent some files from having different hashes depending on the algorithm implementation used to calculate their hash.<ref>{{cite web|url=https://mldonkey.sourceforge.net/Ed2k-hash|title=Ed2k-hash - MLDonkey|website=mldonkey.sourceforge.net|access-date=23 April 2018|archive-date=19 December 2017|archive-url=https://web.archive.org/web/20171219205033/http://mldonkey.sourceforge.net/Ed2k-hash|url-status=dead}}</ref>
=== AICH ===
{{main|eMule#Basic concepts}}
The AICH (Advanced Intelligent Corruption Handling) is an eMule extension. It subdivides the 9500 KiB chunk into 180-KiB blocks and builds a [[Merkle tree]] out of the SHA1 hashes of the 53 blocks, so that the root hash of each block is called a ''block hash''. The block hashes further feed into a Merkle tree, the root hash of which is the actual AICH root hash. The smaller block size allows eMule clients to more precisely identifify locations of corruption.<ref>{{cite web |title=Corruption Handling |url=http://www.emule-project.net/home/perl/help.cgi?l=1&rm=show_topic&topic_id=589 |website=www.emule-project.net}}</ref>
== Server links ==
Line 39 ⟶ 42:
ed2k://|server|IP|PORT|/
* IP
* PORT
Example:
Line 49 ⟶ 52:
* [[Magnet URI scheme]]
* [[Metalink]]
* [[Named data networking]]
== References ==
Line 55 ⟶ 60:
== External links ==
* [http://forum.emule-project.net/index.php?showtopic=46944 emule forum guides] How to remove the ed2k link protocol association in windows.
* [http://wiki.amule.org/
* [http://www.emule-project.net/home/perl/help.cgi?l=1&rm=show_topic&topic_id=422 emule project] Ed2k link formats supported by emule client.
* [
* [http://phantomp2p.com Phantom P2P] eD2k Links Provider
{{URI scheme|state = uncollapsed}}
Line 64 ⟶ 69:
[[Category:File sharing]]
[[Category:URI schemes]]
|