Abstract
In this paper, we present one of the first and most extensive characterizations of closed community-based P2P systems. Such systems are organic groups of peer-to-peer (P2P) clients, which can be joined only by users belonging to a certain network (e.g., connected to a given Internet Service Provider (ISP)). A number of factors motivate the growth of these communities, such as quality of content, anonymity of transfers, and the potential for better performance that enhances user experience. Our study is conducted in two contrasting environments—a campus network and a national ISP—located in different continents. In both cases, large-scale closed communities have been found to be the predominant P2P systems in use. We shed light both on the factors motivating the growth of such communities, and present results characterizing the extensiveness of their usage, the performance achievable by the systems, and the implications of such communities for network providers. While our findings are interesting in their own right, they also offer important lessons for ongoing research that seeks to localize traffic within ISP boundaries. In particular, our results suggest that (i) in ISPs with heterogeneous access technologies, the performance benefits to users on localizing P2P traffic is largely dependent on the degree of seed-like behavior of peers behind high-bandwidth access technologies; and (ii) while localization can reduce the traffic on Internet peering links, it has the potential to cause a significant increase in traffic on internal links of providers, potentially requiring upgrades of network links.
Similar content being viewed by others
Notes
To avoid connections carrying only control messages, we consider connections with more than 50KB downloaded.
References
ADC (2008) Adc protocol. http://adc.sourceforge.net/ADC.html
Aggarwal V, Feldmann A, Scheideler C (2007) Can ISPs and P2P users cooperate for improved performance? SIGCOMM Comput Commun Rev 37:29–40
Alderson D, Chang H, Roughan M, Uhlig S, Willinger W (2006) The Many Facets of Internet Topology and Traffic. The American Institute for Mathematical Sciences. Journal of Networks and Heterogeneous Media 1(4):569–600
Bethencourt J, Low WY, Simmons I, Williamson M (2007) Establishing darknet connections: an evaluation of usability and security. In: Proceedings of the 3rd symposium on usable privacy and security, SOUPS ‘07. ACM, New York, NY, USA, pp 145–146. doi:10.1145/1280680.1280700
Biddle P, England P, Peinado M, Willman B (2002) The darknet and the future of content distribution. In: DRM
Bindal R, Cao P, Chan W (2006) Improving traffic locality in BitTorrent via biased neighbor selection. In: ICDCS
BitTorrent (2008) http://www.bittorrent.org
Choffnes DR, Bustamante FE (2008) Taming the torrent: a practical approach to reducing cross-ISP traffic in peer-to-peer systems. In: SIGCOMM
Cuevas R, Laoutaris N, Yang X, Siganos G, Rodriguez P (2009) Deep diving into bittorrent locality. CoRR abs/0907.3874
ETSI (2003) ETSI TISPAN—defining the next generation network. http://www.etsi.org/tispan/
eMule (2008) http://www.emule-project.net
Gummadi K, Dunn R, Saroiu S, Gribble S, Levy H, Zahorjan J (2003) Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. In: SOSP
Guo L, Chen S, Xiao Z, Tan E, Ding X, Zhang X (2005) Measurements, analysis, and modeling of BitTorrent-like systems. In: IMC
Karagiannis T, Rodriguez P, Papagiannaki K (2005) Should Internet Service Providers Fear Peer-Assisted Content Distribution? In: IMC
Labovitz C, Iekel-Johnson S, McPherson D, Oberheide J, Jahanian F (2010) Internet inter-domain traffic. In: Proceedings of the ACM SIGCOMM 2010 conference. ACM, New York, NY, USA, pp 75–86. doi:10.1145/1851182.1851194
Liu B, Cui Y, Lu Y, Xue Y (2009) Locality-awareness in BitTorrent-like P2P applications. IEEE/ACM Trans Multimedia
Mellia M, Cigno RL, Neri F (2005) Measuring IP and TCP behavior on edge nodes with Tstat. Comput Networks 47(1):1–21. doi:10.1016/j.comnet.2004.06.026
Mellia M, Meo M, Muscariello L, Rossi D (2008) Passive Analysis of TCP Anomalies. Comput Netw 52(14):2663–2676. doi:10.1016/j.comnet.2008.05.010
Piatek M, Madhyastha H, John J, Krishnamurthy A, Anderson T (2009) Pitfalls for isp-friendly p2p design. In: HotNets-VIII
Pietrzyk M, Costeux JL, Urvoy-Keller G, En-Najjary T (2009) Challenging statistical classification for operational usage: the adsl case. In: IMC ’09: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference. ACM, New York, NY, USA, pp 122–135. doi:10.1145/1644893.1644908
Rogers M, Bhatti S (2007) How to disappear completely: a survey of private peer-to-peer networks. In: SPACE
Saroiu S, Gummadi K, Gribble S (2003) Measuring and analyzing the characteristics of Napster and Gnutella hosts. In: Multimedia System
Seedorf J, Kiesel S, Stiemerling M (2009) Traffic localization for P2P-applications: the ALTO approach. In: IEEE P2P
Sen S, Wang J (2002) Analyzing peer-to-peer traffic across large networks. In: IMW
Shen G, Wang Y, Xiong Y, Zhao B, Zhang Z (2007) HPTP: relieving the tension between ISPs and P2P. In: IPTPS
Tstat (2008) http://www.tstat.polito.it
Xie H, Yang YR, Krishnamurthy A, Liu Y, Silberschatz A (2008) P4P: provider portal for applications. In: SIGCOMM
Zhang C, Dhungel P, Wu D, Liu Z, Ross K (2010) BitTorrent Darknets. In: INFOCOM
Zhang Y, Roughan M, Duffield N, Greenberg A (2003) Fast accurate computation of large-scale IP traffic matrices from link loads. In: SIGMETRICS
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Torres, R., Mellia, M., Munafo, M.M. et al. Characterization of community based-P2P systems and implications for traffic localization. Peer-to-Peer Netw. Appl. 6, 118–133 (2013). https://doi.org/10.1007/s12083-012-0132-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-012-0132-z