skip to main content
10.1145/1367497.1367537acmconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article

A comparative analysis of web and peer-to-peer traffic

Published:21 April 2008Publication History

ABSTRACT

Peer-to-Peer (P2P) applications continue to grow in popularity, and have reportedly overtaken Web applications as the single largest contributor to Internet traffic. Using traces collected from a large edge network, we conduct an extensive analysis of P2P traffic, compare P2P traffic with Web traffic, and discuss the implications of increased P2P traffic. In addition to studying the aggregate P2P traffic, we also analyze and compare the two main constituents of P2P traffic in our data, namely BitTorrent and Gnutella. The results presented in the paper may be used for generating synthetic workloads, gaining insights into the functioning of P2P applications, and developing network management strategies. For example, our results suggest that new models are necessary for Internet traffic. As a first step, we present flow-level distributional models for Web and P2P traffic that may be used in network simulation and emulation experiments.

References

  1. M. Arlitt and C. Williamson. Internet Web Servers: Workload Characterization and Performance Implications. ToN, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. F. Campos, K. Jeffay, and F. Smith. Tracking the Evolution of Web Traffic: 1995-2003. In MASCOTS, 2003.Google ScholarGoogle Scholar
  3. B. Cohen. Incentives Build Robustness in BitTorrent. In P2PECON, 2003.Google ScholarGoogle Scholar
  4. M. Crovella and A. Bestavros. Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes. ToN, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. T. Dang, M. Perenyi, A. Gefferth, and S. Molnar. On the Identification and Analysis of P2P Traffic Aggregation. In Networking, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Erman, A. Mahanti, M. Arlitt, I. Cohen, and C. Williamson. Offline/Realtime Traffic Classification Using Semi-Supervised Learning. In Performance, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Erman, A. Mahanti, M. Arlitt, and C. Williamson. Identifying and Discriminating Between Web and Peer-to-Peer Traffic in the Network Core. In WWW, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. K. Gummadi, R. Dunn, S. Saroiu, S. Gribble, H. Levy, and J. Zahorjan. Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload. In SOSP, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. L. Guo, S. Chen, Z. Xiao, E. Tan, X. Ding, and X. Zhang. Measurements, Analysis, and Modeling of BitTorrent-like Systems. In IMC, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Izal, G. Urvoy-Keller, E. Biersack, P. Felber, A. Hamra, and L. Garcs-Erice. Dissecting BitTorrent: Five Months in a Torrents Lifetime. In PAM, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  11. T. Karagiannis, K. Papagiannaki, and M. Faloutsos. BLINC: Multilevel Traffic Classification in the Dark. In SIGCOMM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Klemm, C. Lindemann, M. K. Vernon, and O. P. Waldhorst. Characterizing the Query Behavior in Peer-to-Peer File Sharing Systems. In IMC, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. T. Mori, M. Uchida, R. Kawahara, J. Pan, and S. Goto. Identifying Elephant Flows through Periodically Sampled Packets. In IMC, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. E. O'Neill, B. Lavoie, and R. Bennett. Trends in the Evolution of the Public Web: 1998 - 2002. D-Lib Mag., 2003.Google ScholarGoogle Scholar
  15. V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. Com. Net., 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. V. Paxson and S. Floyd. Wide-Area Traffic: The Failure of Poisson Modeling. ToN, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. L. Plissonneau, J. Costeux, and P. Brown. Analysis of Peer-to-Peer Traffic on ADSL. In PAM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Pouwelse, P. Garbacki, D. Epema, and H. Sips. The Bittorrent P2P File-sharing System: Measurements and Analysis. In IPTPS, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. Saroiu, P. Gummadi, and S. Gribble. Measuring and analyzing the characteristics of Napster and Gnutella hosts. Multi. Sys., 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Sen, O. Spatscheck, and D. Wang. Accurate, Scalable In-Network Identification of P2P Traffic. In WWW, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. Sen and J. Wang. Analyzing Peer-to-Peer Traffic Across Large Networks. ToN, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Soule, K. Salamatian, N. Taft, R. Emilion, and K. Papagiannaki. Flow Classification by Histograms: or How to go on Safari in the Internet. In SIGMETRICS, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. D. Stutzbach and R. Rejaie. Understanding Churn in Peer-to-Peer Networks. In IMC, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. K. Tutschku. A Measurement-Based Traffic Profile of the eDonkey Filesharing Service. In PAM, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  25. Z. Zhang, V. Ribeiro, S. Moon, and C. Diot. Small-time Scaling Behaviors of Internet Backbone Traffic: An Empirical Study. In INFOCOM, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  26. S. Zhao, D. Stutzbach, and R. Rejaie. Characterizing Files in the Modern Gnutella Network: A Measurement Study. In MMCN, 2006.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A comparative analysis of web and peer-to-peer traffic

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WWW '08: Proceedings of the 17th international conference on World Wide Web
        April 2008
        1326 pages
        ISBN:9781605580852
        DOI:10.1145/1367497

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 21 April 2008

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate1,899of8,196submissions,23%

        Upcoming Conference

        WWW '24
        The ACM Web Conference 2024
        May 13 - 17, 2024
        Singapore , Singapore

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader