Peer-to-Peer Networking and Applications

, Volume 6, Issue 2, pp 118–133 | Cite as

Characterization of community based-P2P systems and implications for traffic localization

  • Ruben Torres
  • Marco Mellia
  • Maurizio M. Munafo
  • Sanjay G. Rao
Article

Abstract

In this paper, we present one of the first and most extensive characterizations of closed community-based P2P systems. Such systems are organic groups of peer-to-peer (P2P) clients, which can be joined only by users belonging to a certain network (e.g., connected to a given Internet Service Provider (ISP)). A number of factors motivate the growth of these communities, such as quality of content, anonymity of transfers, and the potential for better performance that enhances user experience. Our study is conducted in two contrasting environments—a campus network and a national ISP—located in different continents. In both cases, large-scale closed communities have been found to be the predominant P2P systems in use. We shed light both on the factors motivating the growth of such communities, and present results characterizing the extensiveness of their usage, the performance achievable by the systems, and the implications of such communities for network providers. While our findings are interesting in their own right, they also offer important lessons for ongoing research that seeks to localize traffic within ISP boundaries. In particular, our results suggest that (i) in ISPs with heterogeneous access technologies, the performance benefits to users on localizing P2P traffic is largely dependent on the degree of seed-like behavior of peers behind high-bandwidth access technologies; and (ii) while localization can reduce the traffic on Internet peering links, it has the potential to cause a significant increase in traffic on internal links of providers, potentially requiring upgrades of network links.

Keywords

Peer-to-peer networks Internet measurements 

References

  1. 1.
    ADC (2008) Adc protocol. http://adc.sourceforge.net/ADC.html
  2. 2.
    Aggarwal V, Feldmann A, Scheideler C (2007) Can ISPs and P2P users cooperate for improved performance? SIGCOMM Comput Commun Rev 37:29–40CrossRefGoogle Scholar
  3. 3.
    Alderson D, Chang H, Roughan M, Uhlig S, Willinger W (2006) The Many Facets of Internet Topology and Traffic. The American Institute for Mathematical Sciences. Journal of Networks and Heterogeneous Media 1(4):569–600MathSciNetMATHCrossRefGoogle Scholar
  4. 4.
    Bethencourt J, Low WY, Simmons I, Williamson M (2007) Establishing darknet connections: an evaluation of usability and security. In: Proceedings of the 3rd symposium on usable privacy and security, SOUPS ‘07. ACM, New York, NY, USA, pp 145–146. doi:10.1145/1280680.1280700 CrossRefGoogle Scholar
  5. 5.
    Biddle P, England P, Peinado M, Willman B (2002) The darknet and the future of content distribution. In: DRMGoogle Scholar
  6. 6.
    Bindal R, Cao P, Chan W (2006) Improving traffic locality in BitTorrent via biased neighbor selection. In: ICDCSGoogle Scholar
  7. 7.
    BitTorrent (2008) http://www.bittorrent.org
  8. 8.
    Choffnes DR, Bustamante FE (2008) Taming the torrent: a practical approach to reducing cross-ISP traffic in peer-to-peer systems. In: SIGCOMMGoogle Scholar
  9. 9.
    Cuevas R, Laoutaris N, Yang X, Siganos G, Rodriguez P (2009) Deep diving into bittorrent locality. CoRR abs/0907.3874Google Scholar
  10. 10.
    ETSI (2003) ETSI TISPAN—defining the next generation network. http://www.etsi.org/tispan/
  11. 11.
  12. 12.
    Gummadi K, Dunn R, Saroiu S, Gribble S, Levy H, Zahorjan J (2003) Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. In: SOSPGoogle Scholar
  13. 13.
    Guo L, Chen S, Xiao Z, Tan E, Ding X, Zhang X (2005) Measurements, analysis, and modeling of BitTorrent-like systems. In: IMCGoogle Scholar
  14. 14.
    Karagiannis T, Rodriguez P, Papagiannaki K (2005) Should Internet Service Providers Fear Peer-Assisted Content Distribution? In: IMCGoogle Scholar
  15. 15.
    Labovitz C, Iekel-Johnson S, McPherson D, Oberheide J, Jahanian F (2010) Internet inter-domain traffic. In: Proceedings of the ACM SIGCOMM 2010 conference. ACM, New York, NY, USA, pp 75–86. doi:10.1145/1851182.1851194 Google Scholar
  16. 16.
    Liu B, Cui Y, Lu Y, Xue Y (2009) Locality-awareness in BitTorrent-like P2P applications. IEEE/ACM Trans MultimediaGoogle Scholar
  17. 17.
    Mellia M, Cigno RL, Neri F (2005) Measuring IP and TCP behavior on edge nodes with Tstat. Comput Networks 47(1):1–21. doi:10.1016/j.comnet.2004.06.026 Google Scholar
  18. 18.
    Mellia M, Meo M, Muscariello L, Rossi D (2008) Passive Analysis of TCP Anomalies. Comput Netw 52(14):2663–2676. doi:10.1016/j.comnet.2008.05.010 MATHCrossRefGoogle Scholar
  19. 19.
    Piatek M, Madhyastha H, John J, Krishnamurthy A, Anderson T (2009) Pitfalls for isp-friendly p2p design. In: HotNets-VIIIGoogle Scholar
  20. 20.
    Pietrzyk M, Costeux JL, Urvoy-Keller G, En-Najjary T (2009) Challenging statistical classification for operational usage: the adsl case. In: IMC ’09: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference. ACM, New York, NY, USA, pp 122–135. doi:10.1145/1644893.1644908 CrossRefGoogle Scholar
  21. 21.
    Rogers M, Bhatti S (2007) How to disappear completely: a survey of private peer-to-peer networks. In: SPACEGoogle Scholar
  22. 22.
    Saroiu S, Gummadi K, Gribble S (2003) Measuring and analyzing the characteristics of Napster and Gnutella hosts. In: Multimedia SystemGoogle Scholar
  23. 23.
    Seedorf J, Kiesel S, Stiemerling M (2009) Traffic localization for P2P-applications: the ALTO approach. In: IEEE P2PGoogle Scholar
  24. 24.
    Sen S, Wang J (2002) Analyzing peer-to-peer traffic across large networks. In: IMWGoogle Scholar
  25. 25.
    Shen G, Wang Y, Xiong Y, Zhao B, Zhang Z (2007) HPTP: relieving the tension between ISPs and P2P. In: IPTPSGoogle Scholar
  26. 26.
  27. 27.
    Xie H, Yang YR, Krishnamurthy A, Liu Y, Silberschatz A (2008) P4P: provider portal for applications. In: SIGCOMMGoogle Scholar
  28. 28.
    Zhang C, Dhungel P, Wu D, Liu Z, Ross K (2010) BitTorrent Darknets. In: INFOCOMGoogle Scholar
  29. 29.
    Zhang Y, Roughan M, Duffield N, Greenberg A (2003) Fast accurate computation of large-scale IP traffic matrices from link loads. In: SIGMETRICSGoogle Scholar

Copyright information

© Springer Science + Business Media, LLC 2012

Authors and Affiliations

  • Ruben Torres
    • 1
  • Marco Mellia
    • 2
  • Maurizio M. Munafo
    • 2
  • Sanjay G. Rao
    • 1
  1. 1.Purdue UniversityWest LafayetteUSA
  2. 2.Politecnico di TorinoTorinoItaly

Personalised recommendations