The Community for Technology Leaders
RSS Icon
Issue No.05 - September/October (2008 vol.12)
pp: 70-77
Dietmar Tutsch , University of Technology, Berlin
Gilbert Babin , HEC Montr?al
Peter Kropf , University of Neuch?tel, Switzerland
Characterizing traffic behavior helps to optimize the network architecture for improved performance. Using a modified LimeWire servent (for both the server and client) and a variance-time plot for traffic characterization, the authors analyze the Gnutella protocol's traffic shape and find that the messages exhibit a self-similar shape. This result shows network designers that they need to consider the self-similar traffic shape in their set-up — for instance, by introducing appropriate buffer sizes.
self-similarity, Gnutella protocol, Gnutella, peer-to-peer network, P2P, network traffic analysis, inter-arrival times, traffic shape, peer-to-peer
Dietmar Tutsch, Gilbert Babin, Peter Kropf, "Application-Layer Traffic Analysis of a Peer-to-Peer System", IEEE Internet Computing, vol.12, no. 5, pp. 70-77, September/October 2008, doi:10.1109/MIC.2008.93
1. W.E. Leland et al., "On the Self-Similar Nature of Ethernet traffic (Extended Version)," IEEE/ACM Trans. Networking, vol. 2, no. 1, 1994, pp. 1–14.
2. W. Willinger et al., "Self-Similarity through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level," IEEE/ACM Trans. Networking, vol. 5, no. 1, 1997, pp. 71–86.
3. M.T. Lucas et al., "Statistical Characterization of Wide-Area IP Traffic," Proc. 6th Int'l Conf. Computer Comm. and Networks, IEEE CS Press, 1997, pp. 442–447.
4. K. Fukuda, M. Takayasu, and H. Takayasu, "A Cause of Self-Similarity in TCP Traffic," Int'l J. Comm. Systems, vol. 18, no. 6, 2005, pp. 603–617.
5. A. Feldmann, A. Gilbert, and W. Willinger, "Data Networks as Cascades: Investigating the Multifractal Nature of Internet WAN Traffic," ACM SIGCOMM Computer Comm. Rev., vol. 28, no. 4, 1998, pp. 42–55.
6. L. Atzori, N. Aste, and M. Isola, "Estimation of Multifractal Parameters in Traffic Measurement: An Accuracy-Based Real-Time Approach," Computer Comm., vol. 29, no. 11, 2006, pp. 1879–1888.
7. M. Ripeanu, "Peer-to-Peer Architecture Case Study: Gnutella Network," Proc. 1st Int'l Conf. Peer-to-Peer Computing, IEEE CS Press, 2001, pp. 99–100.
8. S. Sen and J. Wang, "Analyzing Peer-to-Peer Traffic across Large Networks," IEEE/ACM Trans. Networking, vol. 12, no. 2, 2004, pp. 219–232.
9. E. Markatos, "Tracing a Large-Scale Peer-to-Peer System: An Hour in the Life of Gnutella," Proc. 2nd IEEE/ACM Int'l Symp. Cluster Computing and the Grid (CCGRID 02), IEEE CS Press, 2002, pp. 56–65.
10. D. Stutzbach and R. Rejaie, "Characterizing the Two-Tier Gnutella Topology," ACM SIGMETRICS Performance Evaluation Rev., vol. 33, no. 1, 2005, pp. 402–403.
11. Q. Lv, S. Ratnasamy, and S. Shenker, "Can Heterogeneity Make Gnutella Scalable?" Peer-to-Peer Systems: First Int'l Workshop (IPTPS 02), LNCS 2429, Springer, 2002, pp. 94–103.
12. Y. Chawathe et al., "Making Gnutella-Like P2P Systems Scalable," Proc. 2003 Conf. Applications, Technologies, Architectures, and Protocols for Computer Comm., ACM Press, 2003, pp. 407–418.
13. J. Vaucher et al., "Experimenting with Gnutella Communities," Proc. Conf. Distributed Communities on the Web (DCW 02), LNCS 2468, Springer-Verlag, 2002, pp. 85–99.
14. M. Andreolini, R. Lancellotti, and P. Yu, "Analysis of Peer-to-Peer Systems: Workload Characterization and Effects on Traffic Cacheability," Proc. 12th Annual Int'l Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems (MASCOTS 04), IEEE CS Press, 2004, pp. 95–104.
15. D. Leonard, V. Rai, and D. Loguinov, "On Lifetime-Based Node Failure and Stochastic Resilience of Decentralized Peer-to-Peer Networks," Proc. 2005 ACM SIGMETRICS Int'l Conf. Measurement and Modeling of Computer Systems, ACM Press, 2005, pp. 26–37.
5 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool