Peer-to-Peer Traffic: From Measurements to Analysis

被引:0
|
作者
Guillemin, Fabrice [1 ]
Rosenberg, Catherine [2 ]
Le, Long [2 ]
Brugier, Guillaume Vu [1 ]
机构
[1] Orange Labs, Lannion, France
[2] Univ Waterloo, Dept ECE, Waterloo, ON, Canada
关键词
D O I
10.1109/GLOCOM.2008.ECP.467
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We report in this paper measurements from France Telecom commercial networks carrying traffic generated and received by ADSL and FTTH customers. By adopting a flow-based approach to traffic analysis, we show that both types of customers experience similar peer-to-peer services in that the bit rates that they see is rather low. In order to understand the origin of these similarities, we develop a mathematical model, which could be seen as an abstraction of a file sharing process between peers according to the principles of eDonkey. This model allows us to exhibit a phase transition phenomenon which is nested in the file sharing principle. We believe that this phenomenon explains why both types of customers see a congested peer-to-peer network.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] On the Benefits of Cooperative Proxy Caching for Peer-to-Peer Traffic
    Hefeeda, Mohamed
    Noorizadeh, Behrooz
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2010, 21 (07) : 998 - 1010
  • [42] Analysis of Peer-to-Peer Networks from a Dependability Perspective
    Beitollahi, Hakem
    Deconinck, Geert
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 101 - 108
  • [43] A Traffic Localization Strategy for Peer-to-Peer Live Streaming
    Dai, Chao
    Jiang, Yong
    Xia, Shutao
    Zheng, Haitao
    Cui, Laizhong
    2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [44] Classifying Peer-to-peer Traffic using Protocol Hierarchy
    Puangpronpitag, Somnuk
    Chuachan, Thongchai
    Pawara, Pornntiwa
    2014 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCOINS), 2014,
  • [45] Design and Evaluation of a Proxy Cache for Peer-to-Peer Traffic
    Hefeeda, Mohamed
    Hsu, Cheng-Hsin
    Mokhtarian, Kianoosh
    IEEE TRANSACTIONS ON COMPUTERS, 2011, 60 (07) : 964 - 977
  • [46] Support vector machine detection of peer-to-peer traffic
    Gonzalez-Castano, F. J.
    Rodriguez-Hernandez, P. S.
    Martinez-Alvarez, R. P.
    Gomez, A.
    Lopez-Cabido, I.
    Villasuso-Barreiro, J.
    PROCEEDINGS OF THE 2006 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE FOR MEASUREMENT SYSTEMS AND APPLICATIONS, 2006, : 103 - +
  • [47] A Model Approach to Estimate Peer-to-Peer Traffic Matrices
    Xu, Ke
    Shen, Meng
    Ye, Mingjiang
    2011 PROCEEDINGS IEEE INFOCOM, 2011, : 676 - 684
  • [48] Analyzing peer-to-peer traffic across large networks
    Sen, S
    Wang, J
    IMW 2002: PROCEEDINGS OF THE SECOND INTERNET MEASUREMENT WORKSHOP, 2002, : 137 - 150
  • [49] Bounding peer-to-peer upload traffic in client networks
    Huang, Chun-Ying
    Lei, Chin-Laung
    37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2007, : 759 - +
  • [50] Analyzing peer-to-peer traffic across large networks
    Sen, S
    Wang, J
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2004, 12 (02) : 219 - 232