Skip to main content

On the Stability of Skype Super Nodes

  • Conference paper
Traffic Monitoring and Analysis (TMA 2011)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 6613))

Included in the following conference series:

Abstract

The heart of skype services, one of the most ubiquitous P2P networks, is based on a set of super nodes. Choosing stable SNs is an important task, since it improves the whole performance and quality of the P2P network [1, 2]. In this paper we shed light on the life cycle of SNs using extensive data sets on Skype Super nodes, which were gathered over a period of 3 months. We then suggest how to choose a more stable SNs set.

The dynamic of nodes is inherent to the use of a computer, which is unplugged for some time or is mobile. Hence it is natural to predict that a Super Node would have multiple sessions correlated with the time the computer is up. Surprisingly, we show that 40% of the Super Nodes have only one session, with median residual life time of 1.75 days. These nodes also have a significantly shorter lifespan than Super Nodes that have multiple sessions, which have median residual life time of 67.5 days. We propose and give evidence that nodes with one session are nodes with dynamic IP addresses, and hence they have ended their life cycle due to a change of IP address. We show that the nodes with multiple sessions are mostly nodes with static IPs, and that choosing super nodes with static IPs would increase the availability and stability of the P2P network significantly.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Garcés-Erice, L., Biersack, E.W., Felber, P., Ross, K.W., Urvoy-Keller, G.: Hierarchical peer-to-peer systems. In: Kosch, H., Böszörményi, L., Hellwagner, H. (eds.) Euro-Par 2003. LNCS, vol. 2790, pp. 1230–1239. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Wang, F., Liu, J., Xiong, Y.: Stable peers: Existence, importance, and application in peer-to-peer live video streaming. In: IEEE Infocom (2008)

    Google Scholar 

  3. Saroiu, S., Gummadi, S., Gribble, P.: A measurement study of peer-to-peer file sharing systems. In: Multimedia Computing and Networking (2002)

    Google Scholar 

  4. Sen, S., Wang, J.: Analyzing peer-to-peer traffic across large networks. In: ACM SIGCOMM Internet Measurement Workshop (2002)

    Google Scholar 

  5. Bhagwan, R., Savage, S., Voelker, G.: Understanding availability. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735, Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Gummadi, K.P., Dunn, R.J., Saroiu, S., Gribble, S.D., Levy, H.M., Zahorjan, J.: Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. In: ACM SOSP (2003)

    Google Scholar 

  7. Godfrey, P., Shenker, S., Stoica, I.: Minimizing churn in distributed systems. In: ACM SIGCOMM (2006)

    Google Scholar 

  8. Stutzbach, D., Rejaie, R.: Characterizing churn in peer-to-peer networks. Tech. Rep. (May 2005)

    Google Scholar 

  9. Guha, S., Daswani, N., Jain, R.: An experimental study of the skype peer-to-peer voip system. In: IPTPS (2006)

    Google Scholar 

  10. Baset, S.A., Schulzrinne, H.G.: An analysis of the skype peer-to-peer internet telephony protocol. In: IEEE INFOCOM (2006)

    Google Scholar 

  11. kazaa (2007), http://kazaa.com

  12. Joost, http://joost.com

  13. iMesh, http://www.imesh.com/

  14. Morpheus discussion group, http://www.gnutellaforums.com/morpheus-windows/

  15. Suh, K.F., Kurose, D.R., Towsley, D.J.: Characterizing and detecting skype-relayed traffic. In: IEEE INFOCOM (2006)

    Google Scholar 

  16. Ehlert, S., Magedanz, T., Petgang, S., Sisalem, D.: Analysis and signature skype voip session traffic. Tech. Rep. NGNI-SKYPE-06B (2006)

    Google Scholar 

  17. Fabrice, D.: Skype uncovered (2005), http://www.ossir.org/windows/supports/-2005/2005-11-07/EADS-CCR_Fabrice_Skype.pdf

  18. Recon 2006 - Fabrice Desclaux and Kostya Kortchinsky - Vanilla Skype (2006), http://recon.cx/en/f/vskype-part1.pdf , http://recon.cx/en/f/vskype-part2.pdf

  19. Biondi, P., Desclaux, F.: Silver needle in the skype. In: Blackhat (2006)

    Google Scholar 

  20. Cicco, L.D., Mascolo, S., Palmisano, V.: An experimental investigation of the congestion control used by skype voIP. In: Boavida, F., Monteiro, E., Mascolo, S., Koucheryavy, Y. (eds.) WWIC 2007. LNCS, vol. 4517, pp. 153–164. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  21. Apoc Matrix, The SkypeLogger (December 2006), http://www.epokh.org/drupy/files/Skype%20Logger.pdf

  22. Chen, K.-T., Huang, C.-Y., Huang, P., Lei, C.-L.: Quantifying skype user satisfaction. In: ACM SIGCOMM (2006)

    Google Scholar 

  23. Hofeld, T., Binzenhöfer, A., Fiedler, M., Tutschku, K.: Measurement and analysis of skype voip traffic in 3g umts systems. In: The 4th International Workshop on Internet Performance, Simulation, Monitoring and Measurement (2006)

    Google Scholar 

  24. Wang, X., Chen, X., Jajodia, S.: Tracking anonymous peer-to-peer voip calls on the internet. In: ACM Conference on Computer and Communications Security (2005)

    Google Scholar 

  25. Bremler-Barr, A., Dekel, O., Levy, H.: Harvesting skypesuper-nodes. Tech. Rep. (May 2008)

    Google Scholar 

  26. Holz, T., Steiner, M., Dahl, F., Biersack, E., Freiling, F.: Measurements and mitigation of peer to-peer-based botnets: A case study on storm worm. In: LEET 2008: The First USENIX Workshop on Large-Scale Exploits and Emergent Threats (2008)

    Google Scholar 

  27. Kleinrock, L.: Queueing Systems: Volume I – Theory. Wiley Interscience, New York (1975)

    MATH  Google Scholar 

  28. Xie, Y., Yu, F., Achan, K., Gillum, E., Goldszmidt, M., Wobber, T.: How dynamic are ip addresses. In: ACM SIGCOMM (2007)

    Google Scholar 

  29. Khadilkar, M., Feamster, N., Sanders, M., Clark, R.: Usage-based dhcp lease time optimization. In: Internet Measurement Conference (2007)

    Google Scholar 

  30. Krishnamurthy, B.: On network-aware clustering of web clients. In: Proceedings of ACM SIGCOMM, pp. 97–110 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bremler-Barr, A., Goldschmidt, R. (2011). On the Stability of Skype Super Nodes. In: Domingo-Pascual, J., Shavitt, Y., Uhlig, S. (eds) Traffic Monitoring and Analysis. TMA 2011. Lecture Notes in Computer Science, vol 6613. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20305-3_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20305-3_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20304-6

  • Online ISBN: 978-3-642-20305-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics