ABSTRACT
Peer-to-Peer (P2P) applications continue to grow in popularity, and have reportedly overtaken Web applications as the single largest contributor to Internet traffic. Using traces collected from a large edge network, we conduct an extensive analysis of P2P traffic, compare P2P traffic with Web traffic, and discuss the implications of increased P2P traffic. In addition to studying the aggregate P2P traffic, we also analyze and compare the two main constituents of P2P traffic in our data, namely BitTorrent and Gnutella. The results presented in the paper may be used for generating synthetic workloads, gaining insights into the functioning of P2P applications, and developing network management strategies. For example, our results suggest that new models are necessary for Internet traffic. As a first step, we present flow-level distributional models for Web and P2P traffic that may be used in network simulation and emulation experiments.
- M. Arlitt and C. Williamson. Internet Web Servers: Workload Characterization and Performance Implications. ToN, 1997. Google ScholarDigital Library
- F. Campos, K. Jeffay, and F. Smith. Tracking the Evolution of Web Traffic: 1995-2003. In MASCOTS, 2003.Google Scholar
- B. Cohen. Incentives Build Robustness in BitTorrent. In P2PECON, 2003.Google Scholar
- M. Crovella and A. Bestavros. Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes. ToN, 1997. Google ScholarDigital Library
- T. Dang, M. Perenyi, A. Gefferth, and S. Molnar. On the Identification and Analysis of P2P Traffic Aggregation. In Networking, 2006. Google ScholarDigital Library
- J. Erman, A. Mahanti, M. Arlitt, I. Cohen, and C. Williamson. Offline/Realtime Traffic Classification Using Semi-Supervised Learning. In Performance, 2007. Google ScholarDigital Library
- J. Erman, A. Mahanti, M. Arlitt, and C. Williamson. Identifying and Discriminating Between Web and Peer-to-Peer Traffic in the Network Core. In WWW, 2007. Google ScholarDigital Library
- K. Gummadi, R. Dunn, S. Saroiu, S. Gribble, H. Levy, and J. Zahorjan. Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload. In SOSP, 2003. Google ScholarDigital Library
- L. Guo, S. Chen, Z. Xiao, E. Tan, X. Ding, and X. Zhang. Measurements, Analysis, and Modeling of BitTorrent-like Systems. In IMC, 2005. Google ScholarDigital Library
- M. Izal, G. Urvoy-Keller, E. Biersack, P. Felber, A. Hamra, and L. Garcs-Erice. Dissecting BitTorrent: Five Months in a Torrents Lifetime. In PAM, 2004.Google ScholarCross Ref
- T. Karagiannis, K. Papagiannaki, and M. Faloutsos. BLINC: Multilevel Traffic Classification in the Dark. In SIGCOMM, 2005. Google ScholarDigital Library
- A. Klemm, C. Lindemann, M. K. Vernon, and O. P. Waldhorst. Characterizing the Query Behavior in Peer-to-Peer File Sharing Systems. In IMC, 2004. Google ScholarDigital Library
- T. Mori, M. Uchida, R. Kawahara, J. Pan, and S. Goto. Identifying Elephant Flows through Periodically Sampled Packets. In IMC, 2004. Google ScholarDigital Library
- E. O'Neill, B. Lavoie, and R. Bennett. Trends in the Evolution of the Public Web: 1998 - 2002. D-Lib Mag., 2003.Google Scholar
- V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. Com. Net., 1999. Google ScholarDigital Library
- V. Paxson and S. Floyd. Wide-Area Traffic: The Failure of Poisson Modeling. ToN, 1995. Google ScholarDigital Library
- L. Plissonneau, J. Costeux, and P. Brown. Analysis of Peer-to-Peer Traffic on ADSL. In PAM, 2005. Google ScholarDigital Library
- J. Pouwelse, P. Garbacki, D. Epema, and H. Sips. The Bittorrent P2P File-sharing System: Measurements and Analysis. In IPTPS, 2005. Google ScholarDigital Library
- S. Saroiu, P. Gummadi, and S. Gribble. Measuring and analyzing the characteristics of Napster and Gnutella hosts. Multi. Sys., 2003. Google ScholarDigital Library
- S. Sen, O. Spatscheck, and D. Wang. Accurate, Scalable In-Network Identification of P2P Traffic. In WWW, 2004. Google ScholarDigital Library
- S. Sen and J. Wang. Analyzing Peer-to-Peer Traffic Across Large Networks. ToN, 2004. Google ScholarDigital Library
- A. Soule, K. Salamatian, N. Taft, R. Emilion, and K. Papagiannaki. Flow Classification by Histograms: or How to go on Safari in the Internet. In SIGMETRICS, 2005. Google ScholarDigital Library
- D. Stutzbach and R. Rejaie. Understanding Churn in Peer-to-Peer Networks. In IMC, 2006. Google ScholarDigital Library
- K. Tutschku. A Measurement-Based Traffic Profile of the eDonkey Filesharing Service. In PAM, 2004.Google ScholarCross Ref
- Z. Zhang, V. Ribeiro, S. Moon, and C. Diot. Small-time Scaling Behaviors of Internet Backbone Traffic: An Empirical Study. In INFOCOM, 2003.Google ScholarCross Ref
- S. Zhao, D. Stutzbach, and R. Rejaie. Characterizing Files in the Modern Gnutella Network: A Measurement Study. In MMCN, 2006.Google ScholarCross Ref
Index Terms
- A comparative analysis of web and peer-to-peer traffic
Recommendations
Analyzing peer-to-peer traffic across large networks
The use of peer-to-peer (P2P) applications is growing dramatically, particularly for sharing large video/audio files and software. In this paper, we analyze P2P traffic by measuring flow-level information collected at multiple border routers across a ...
Application-Layer Traffic Analysis of a Peer-to-Peer System
Characterizing traffic behavior helps to optimize the network architecture for improved performance. Using a modified LimeWire servent (for both the server and client) and a variance-time plot for traffic characterization, the authors analyze the ...
Peer-to-peer multimedia applications
MM '06: Proceedings of the 14th ACM international conference on MultimediaIn both academia and industry, peer-to-peer (P2P) applications have attracted great attention. Peer-to-peer file sharing applications, such as Napster, Gnutella, Kazaa, BitTorrent, Skype and PPLive, have witnessed tremendous success among end users. And ...
Comments