Skip to main content
Log in

Characterization of community based-P2P systems and implications for traffic localization

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

In this paper, we present one of the first and most extensive characterizations of closed community-based P2P systems. Such systems are organic groups of peer-to-peer (P2P) clients, which can be joined only by users belonging to a certain network (e.g., connected to a given Internet Service Provider (ISP)). A number of factors motivate the growth of these communities, such as quality of content, anonymity of transfers, and the potential for better performance that enhances user experience. Our study is conducted in two contrasting environments—a campus network and a national ISP—located in different continents. In both cases, large-scale closed communities have been found to be the predominant P2P systems in use. We shed light both on the factors motivating the growth of such communities, and present results characterizing the extensiveness of their usage, the performance achievable by the systems, and the implications of such communities for network providers. While our findings are interesting in their own right, they also offer important lessons for ongoing research that seeks to localize traffic within ISP boundaries. In particular, our results suggest that (i) in ISPs with heterogeneous access technologies, the performance benefits to users on localizing P2P traffic is largely dependent on the degree of seed-like behavior of peers behind high-bandwidth access technologies; and (ii) while localization can reduce the traffic on Internet peering links, it has the potential to cause a significant increase in traffic on internal links of providers, potentially requiring upgrades of network links.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Notes

  1. To avoid connections carrying only control messages, we consider connections with more than 50KB downloaded.

References

  1. ADC (2008) Adc protocol. http://adc.sourceforge.net/ADC.html

  2. Aggarwal V, Feldmann A, Scheideler C (2007) Can ISPs and P2P users cooperate for improved performance? SIGCOMM Comput Commun Rev 37:29–40

    Article  Google Scholar 

  3. Alderson D, Chang H, Roughan M, Uhlig S, Willinger W (2006) The Many Facets of Internet Topology and Traffic. The American Institute for Mathematical Sciences. Journal of Networks and Heterogeneous Media 1(4):569–600

    Article  MathSciNet  MATH  Google Scholar 

  4. Bethencourt J, Low WY, Simmons I, Williamson M (2007) Establishing darknet connections: an evaluation of usability and security. In: Proceedings of the 3rd symposium on usable privacy and security, SOUPS ‘07. ACM, New York, NY, USA, pp 145–146. doi:10.1145/1280680.1280700

    Chapter  Google Scholar 

  5. Biddle P, England P, Peinado M, Willman B (2002) The darknet and the future of content distribution. In: DRM

  6. Bindal R, Cao P, Chan W (2006) Improving traffic locality in BitTorrent via biased neighbor selection. In: ICDCS

  7. BitTorrent (2008) http://www.bittorrent.org

  8. Choffnes DR, Bustamante FE (2008) Taming the torrent: a practical approach to reducing cross-ISP traffic in peer-to-peer systems. In: SIGCOMM

  9. Cuevas R, Laoutaris N, Yang X, Siganos G, Rodriguez P (2009) Deep diving into bittorrent locality. CoRR abs/0907.3874

  10. ETSI (2003) ETSI TISPAN—defining the next generation network. http://www.etsi.org/tispan/

  11. eMule (2008) http://www.emule-project.net

  12. Gummadi K, Dunn R, Saroiu S, Gribble S, Levy H, Zahorjan J (2003) Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. In: SOSP

  13. Guo L, Chen S, Xiao Z, Tan E, Ding X, Zhang X (2005) Measurements, analysis, and modeling of BitTorrent-like systems. In: IMC

  14. Karagiannis T, Rodriguez P, Papagiannaki K (2005) Should Internet Service Providers Fear Peer-Assisted Content Distribution? In: IMC

  15. Labovitz C, Iekel-Johnson S, McPherson D, Oberheide J, Jahanian F (2010) Internet inter-domain traffic. In: Proceedings of the ACM SIGCOMM 2010 conference. ACM, New York, NY, USA, pp 75–86. doi:10.1145/1851182.1851194

    Google Scholar 

  16. Liu B, Cui Y, Lu Y, Xue Y (2009) Locality-awareness in BitTorrent-like P2P applications. IEEE/ACM Trans Multimedia

  17. Mellia M, Cigno RL, Neri F (2005) Measuring IP and TCP behavior on edge nodes with Tstat. Comput Networks 47(1):1–21. doi:10.1016/j.comnet.2004.06.026

    Google Scholar 

  18. Mellia M, Meo M, Muscariello L, Rossi D (2008) Passive Analysis of TCP Anomalies. Comput Netw 52(14):2663–2676. doi:10.1016/j.comnet.2008.05.010

    Article  MATH  Google Scholar 

  19. Piatek M, Madhyastha H, John J, Krishnamurthy A, Anderson T (2009) Pitfalls for isp-friendly p2p design. In: HotNets-VIII

  20. Pietrzyk M, Costeux JL, Urvoy-Keller G, En-Najjary T (2009) Challenging statistical classification for operational usage: the adsl case. In: IMC ’09: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference. ACM, New York, NY, USA, pp 122–135. doi:10.1145/1644893.1644908

    Chapter  Google Scholar 

  21. Rogers M, Bhatti S (2007) How to disappear completely: a survey of private peer-to-peer networks. In: SPACE

  22. Saroiu S, Gummadi K, Gribble S (2003) Measuring and analyzing the characteristics of Napster and Gnutella hosts. In: Multimedia System

  23. Seedorf J, Kiesel S, Stiemerling M (2009) Traffic localization for P2P-applications: the ALTO approach. In: IEEE P2P

  24. Sen S, Wang J (2002) Analyzing peer-to-peer traffic across large networks. In: IMW

  25. Shen G, Wang Y, Xiong Y, Zhao B, Zhang Z (2007) HPTP: relieving the tension between ISPs and P2P. In: IPTPS

  26. Tstat (2008) http://www.tstat.polito.it

  27. Xie H, Yang YR, Krishnamurthy A, Liu Y, Silberschatz A (2008) P4P: provider portal for applications. In: SIGCOMM

  28. Zhang C, Dhungel P, Wu D, Liu Z, Ross K (2010) BitTorrent Darknets. In: INFOCOM

  29. Zhang Y, Roughan M, Duffield N, Greenberg A (2003) Fast accurate computation of large-scale IP traffic matrices from link loads. In: SIGMETRICS

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruben Torres.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Torres, R., Mellia, M., Munafo, M.M. et al. Characterization of community based-P2P systems and implications for traffic localization. Peer-to-Peer Netw. Appl. 6, 118–133 (2013). https://doi.org/10.1007/s12083-012-0132-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-012-0132-z

Keywords

Navigation