Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Analyzing peer-to-peer traffic across large networks

Published: 01 April 2004 Publication History

Abstract

The use of peer-to-peer (P2P) applications is growing dramatically, particularly for sharing large video/audio files and software. In this paper, we analyze P2P traffic by measuring flow-level information collected at multiple border routers across a large ISP network, and report our investigation of three popular P2P systems--FastTrack, Gnutella, and Direct-Connect. We characterize the P2P trafffic observed at a single ISP and its impact on the underlying network. We observe very skewed distribution in the traffic across the network at different levels of spatial aggregation (IP, prefix, AS). All three P2P systems exhibit significant dynamics at short time scale and particularly at the IP address level. Still, the fraction of P2P traffic contributed by each prefix is more stable than the corresponding distribution of either Web traffic or overall traffic. The high volume and good stability properties of P2P traffic suggests that the P2P workload is a good candidate for being managed via application-specific layer-3 traffic engineering in an ISP's network.

References

[1]
{1} Ultrapeers: Another step toward Gnutella scalability, A. Singla and C. Rohrs. (2001, Dec.). {Online}. Available: http://RFC-Gnutella.source-forge.net/Proposals/Ultrapeer]]
[2]
{2} E. Adar and B. Huberman, "Free riding on Gnutella," First Monday, vol. 5, no. 10, Oct. 2000.]]
[3]
{3} B. Krishnamurthy and J. Wang, "On network-aware clustering of web clients," in Proc. ACM SIGCOMM, Aug. 2000, pp. 97-110.]]
[4]
{4} Y. Zhao, J. D. Kubiatowicz, and A. Joseph, "Tapestry: An infrastructure for fault-tolerant wide-area location and routing," Univ. California, Berkeley, Tech. Rep. UCB//CSD-01-1141, Apr. 2000.]]
[5]
{5} S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, "A scalable content-addressable network," in Proc. ACM SIGCOMM, Aug. 2001, pp. 161-171.]]
[6]
{6} A. Rowstron and P. Druschel, "Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems," in Proc. IFIP/ACM Int. Conf. Distributed Systems Platforms (Middleware), Nov. 2001, pp. 329-350.]]
[7]
{7} I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, "Chord: A scalable peer-to-peer lookup service for Internet applications," in Proc. ACM SIGCOMM, Aug. 2001, pp. 141-160.]]
[8]
{8} C. G. Plaxton, R. Rajaraman, and A. W. Richa, "Accessing nearby copies of replicated objects in a distributed environment," in Proc. ACM SPAA, June 1997, pp. 311-320.]]
[9]
{9} J. Li, J. Jannotti, D. S. J. D. Couto, D. R. Karger, and R. Morris, "A scalable location service for geographic ad hoc routing," in Proc. ACM MOBICOM, Aug. 2000, pp. 120-130.]]
[10]
{10} W. J. Bolosky, J. R. Douceur, D. Ely, and M. Theimer, "Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs," in Proc. ACM SIGMETRICS, Santa Clara, CA, 2000, pp. 34-43.]]
[11]
{11} M. Gritter and D. R. Cheriton, "An architecture for content routing support in the Internet," in Proc. USENIX Symp. Internet Technologies and Systems, Mar. 2001, pp. 37-48.]]
[12]
{12} I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong, "Freenet: A distributed anonymous information storage and retrieval system," in Designing Privacy Enhancing Technologies: Proc. Int. Workshop on Design Issues in Anonymity and Unobservability, LNCS 2000, Dec. 2000.]]
[13]
{13} J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao, "Oceanstore: An architecture for global-scale persistent storage," in Proc. ACM ASPLOS, Nov. 2000, pp. 190-201.]]
[14]
{14} A. Bakker, E. Amade, and G. Ballintijn, "The globe distribution network," in Proc. USENIX Annu. Technical Conf., San Diego, CA, June 2000, pp. 141-152.]]
[15]
{15} K. Sripanidkulchai, "The popularity of Gnutella queries and its implications on scalability," in Proc. O'Reilly Peer-To-Peer and Web Services Conf., Sept. 2001.]]
[16]
{16} K. Truelove and A. Chasin, "Morpheus out of the underworld," The O'Reilly Network, July 2001.]]
[17]
{17} B. Krishnamurthy, J. Wang, and Y. Xie, "Early measurements of a cluster based architecture for P2P systems," in Proc. ACM SIGCOMM Internet Measurement Workshop, Nov. 2001, pp. 105-109.]]
[18]
{18} S. Saroiu, P. K. Gummadi, and S. D. Gribble, "A measurement study of peer-to-peer file sharing systems," in Proc. Multimedia Computing and Networking (MMCN), Jan. 2002.]]
[19]
{19} GNUT-Gnutella {Online}. Available: http://www.gnutelliums.com/ linux_unix/gnut/.]]
[20]
{20} Gnutella Hosts {Online}. Available: http://www.gnutellahosts.com.]]
[21]
{21} PAST {Online}. Available: http://www.research.microsoft.com/antr/ PAST.]]
[22]
{22} Napster {Online}. Available: http://www.napster.com.]]
[23]
{23} KaZaA {Online}. Available: http://www.kazaa.com.]]
[24]
{24} Morpheus {Online}. Available: http://www.musiccity.com.]]
[25]
{25} Grokster {Online}. Available: http://www.grokster.com.]]
[26]
{26} Direct Connect {Online}. Available: http://www.neo-modus.com.]]
[27]
{27} Limewire {Online}. Available: http://www.limewire.com.]]
[28]
{28} Bearshare {Online}. Available: http://www.bearshare.com.]]
[29]
{29} A. Feldmann, A. Greenberg, C. Lund, N. Reingold, J. Rexford, and F. True, "Deriving traffic demands for operational IP networks: Methodology and experience," IEEE/ACM Trans. Networking, vol. 9, pp. 265-279, June 2001.]]
[30]
{30} J. Hawkinson and T. Bates. (1996, Mar.) RFC 1930: Guidelines for creation, selection, and registration of an autonomous system (AS). {On-line}. Available: http://ftp.apnic.net/ietf/rfc/rfc1000/rfc1930.txt]]
[31]
{31} M. Ripeanu and I. Foster, "Mapping the Gnutella network," IEEE Internet Computing, vol. 6, pp. 50-57, Jan. 2002.]]
[32]
{32} L. Adamic. Zipf, Power-Laws and Pareto--A Ranking Tutorial. {Online}. Available: http://www.parc.xerox.com/istl/groups/iea/papers/ranking/ranking.html.]]
[33]
{33} L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, "Web caching and Zipf-like distributions: Evidence and implications," in Proc. IEEE INFOCOM, Mar. 1999, pp. 126-134.]]
[34]
{34} White Paper-Netflow Services and Applications {Online}. Available: http://www.cisco.com/warp/public/cc/pd/iosw/ioft/ne_ct/tech/ napps_wp.htm.]]
[35]
{35} M. Faloutsos, P. Faloutsos, and C. Faloutsos, "On power-law relationships of the Internet topology," in Proc. ACM SIGCOMM, Aug./Sept. 1999, pp. 251-262.]]
[36]
{36} W. Fang and L. Peterson, "Inter-AS traffic patterns and their implications," in Proc. IEEE Globecom, Dec. 1999, pp. 1859-1868.]]
[37]
{37} M. E. Crovella and A. Bestavros, "Self-similarity in World Wide Web traffic: Evidence and possible causes," IEEE Trans. Networking, vol. 5, pp. 835-846, Dec. 1997.]]
[38]
{38} P. Barford and M. Crovella, "Generating representative web workloads for network and server performance evaluation," in Proc. ACM SIGMETRICS, June 1998, pp. 151-160.]]
[39]
{39} J. E. Pitkow, "Summary of WWW characterizations," World Wide Web J., vol. 2, pp. 3-13, 1999.]]
[40]
{40} M. F. Arlitt and C. L. Williamson, "Internet web servers: Workload characterization and performance implications," IEEE Trans. Networking, vol. 5, pp. 631-645, Oct. 1997.]]
[41]
{41} L. Subramanian, S. Agarwal, J. Rexford, and R. H. Katz, "Characterizing the Internet hierarchy from multiple vantage points," in Proc. IEEE INFOCOM, June 2002, pp. 618-627.]]
[42]
{42} N. Duffield, C. Lund, and M. Thorup, "Charging from sampled network usage," in Proc. ACM SIGCOMM Internet Measurement Workshop, Nov. 2001, pp. 245-256.]]
[43]
{43} B. Krishnanurthy and J. Wang, "Automated traffic classification for application specific peering," in Proc. ACM SIGCOMM Internet Measurement Workshop, Nov. 2002, pp. 179-180.]]
[44]
{44} M. Jovanovic, F. S. Annexstein, and K. A. Berman, "Scalability issues in large peer-to-peer networks--A case study of Gnutella," Univ. of Cincinnati, Cincinnati, OH, Tech. Rep., 2001.]]
[45]
{45} N. Leibowitz, A. Bergman, R. Ben-Shaul, and A. Shavit, "Are file swapping networks cacheable? Characterizing P2P traffic," in Proc. 7th Int. Workshop Web Content Caching and Distribution, 2002.]]
[46]
{46} S. Saroiu, K. P. Gummadi, R. J. Dunn, S. D. Gribble, and H. M. Levy, "An analysis of Internet content delivery systems," in Proc. 5th Symp. Operating Systems Design and Implementation, 2002, pp. 315-327.]]

Cited By

View all
  • (2022)Detection and Management of P2P Traffic in Networks using Artificial Neural NetworksaJournal of Network and Systems Management10.1007/s10922-021-09637-130:2Online publication date: 1-Apr-2022
  • (2022)Practical and configurable network traffic classification using probabilistic machine learningCluster Computing10.1007/s10586-021-03393-225:4(2839-2853)Online publication date: 1-Aug-2022
  • (2021)Finding Subgraphs in Highly Dynamic NetworksProceedings of the 33rd ACM Symposium on Parallelism in Algorithms and Architectures10.1145/3409964.3461788(140-150)Online publication date: 6-Jul-2021
  • Show More Cited By

Recommendations

Reviews

Dimitrios I Kagklis

This paper analyzes peer-to-peer (P2P) traffic on a real-life, large Internet service provider (ISP) network, by examining three of the most popular P2P applications: FastTrack, Gnutella, and Direct-Connect. It studies traffic generated by both signaling and data transfer, and tries to answer three main questions: how P2P traffic is distributed across the Internet, what the characteristics of the application-level P2P network connectivity are, and how dynamic the P2P systems are. The main finding is that ten percent of clients are usually the most popular servers, and are responsible for originating 99 percent of the overall network traffic. This fact makes P2P systems vulnerable to failure, looking at the network level, since a failure of one of these popular servers can affect the overall P2P network behavior. Furthermore, most users join P2P networks after work, and their number constantly increases until late at night. Moreover, over 60 percent of P2P clients spent more than ten minutes per day connected, and two-thirds of them have broadband network lines. Finally, one of the most interesting results is that the good stability of P2P traffic indicates that application-specific layer-three traffic engineering schemes could be a promising way to manage P2P workload in an ISP network. Overall, this is a very interesting paper, tackling a complicated issue, and offering valuable information about P2P traffic and its impact on the underlying network. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE/ACM Transactions on Networking
IEEE/ACM Transactions on Networking  Volume 12, Issue 2
April 2004
193 pages

Publisher

IEEE Press

Publication History

Published: 01 April 2004
Published in TON Volume 12, Issue 2

Author Tags

  1. P2P
  2. file sharing
  3. peer-to-peer
  4. traffic characterization
  5. traffic measurement

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Detection and Management of P2P Traffic in Networks using Artificial Neural NetworksaJournal of Network and Systems Management10.1007/s10922-021-09637-130:2Online publication date: 1-Apr-2022
  • (2022)Practical and configurable network traffic classification using probabilistic machine learningCluster Computing10.1007/s10586-021-03393-225:4(2839-2853)Online publication date: 1-Aug-2022
  • (2021)Finding Subgraphs in Highly Dynamic NetworksProceedings of the 33rd ACM Symposium on Parallelism in Algorithms and Architectures10.1145/3409964.3461788(140-150)Online publication date: 6-Jul-2021
  • (2018)Parallel mining of time-faded heavy hittersExpert Systems with Applications: An International Journal10.1016/j.eswa.2017.11.02196:C(115-128)Online publication date: 15-Apr-2018
  • (2017)Scalable Bandwidth Allocation Based on Domain Attributes: Towards a DDoS-Resistant Data CenterGLOBECOM 2017 - 2017 IEEE Global Communications Conference10.1109/GLOCOM.2017.8254004(1-6)Online publication date: 4-Dec-2017
  • (2016)Finding persistent items in data streamsProceedings of the VLDB Endowment10.14778/3025111.302511210:4(289-300)Online publication date: 1-Nov-2016
  • (2016)Video Traffic Flow Analysis in Distributed System during Interactive SessionAdvances in Multimedia10.1155/2016/78295702016Online publication date: 1-Apr-2016
  • (2016)Reasons Dynamic Addresses ChangeProceedings of the 2016 Internet Measurement Conference10.1145/2987443.2987461(183-198)Online publication date: 14-Nov-2016
  • (2016)Noisy Bloom Filters for Multi-Set Membership TestingACM SIGMETRICS Performance Evaluation Review10.1145/2964791.290145144:1(139-151)Online publication date: 14-Jun-2016
  • (2016)Noisy Bloom Filters for Multi-Set Membership TestingProceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science10.1145/2896377.2901451(139-151)Online publication date: 14-Jun-2016
  • Show More Cited By

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media