Measuring Mobile Peer-to-Peer Usage: Case Finland 2007

We study the development of mobile peer-to-peer (MP2P) traffic and the usage of MP2P applications in Finland during 2005-2007. Research data consists of 1) traffic traces measured from three Finnish GSM/UMTS networks covering the Internet-bound mobile data traffic generated by 80-90% of Finnish mobile subscribers (N > 4,000,000), and 2) usage log files collected with a dedicated Symbian handset monitoring application (N = 579). In the traffic trace measurement, we notice almost zero P2P file sharing traffic for handsets, but 9-18% of unidentified traffic, part of which possibly being P2P traffic. Potentially a notable growing trend for computer-based P2P file sharing traffic is visible in GSM/UMTS networks, BitTorrent and eDonkey being the most popular protocols. In the panel study, only Fring, a client to several P2P-based communication services, has significant usage and data volume levels.

[1]  Michalis Faloutsos,et al.  File-sharing in the Internet: A characterization of P2P traffic in the backbone , 2003 .

[2]  M. Matuszewski,et al.  Mobile P2PSIP - Peer-to-Peer SIP Communication in Mobile Communities , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.

[3]  Tristan Henderson,et al.  The changing usage of a mature campus-wide wireless network , 2008, Comput. Networks.

[4]  Gerhard Haßlinger ISP Platforms Under a Heavy Peer-to-Peer Workload , 2005, Peer-to-Peer Systems and Applications.

[5]  Jia Wang,et al.  Analyzing peer-to-peer traffic across large networks , 2004, IEEE/ACM Trans. Netw..

[6]  Michalis Faloutsos,et al.  Transport layer identification of P2P traffic , 2004, IMC '04.

[7]  Krishna P. Gummadi,et al.  Measurement, modeling, and analysis of a peer-to-peer file-sharing workload , 2003, SOSP '03.

[8]  Patrick Brown,et al.  Analysis of Peer-to-Peer Traffic on ADSL , 2005, PAM.

[9]  Xiaoning Ding,et al.  A performance study of BitTorrent-like peer-to-peer systems , 2007, IEEE Journal on Selected Areas in Communications.

[10]  Marcin Matuszewski,et al.  Content sharing in mobile P2P networks: myth or reality? , 2006 .

[11]  Ravi Jain,et al.  An Experimental Study of the Skype Peer-to-Peer VoIP System , 2005, IPTPS.

[12]  Henning Schulzrinne,et al.  An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol , 2004, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[13]  Klaus Wehrle,et al.  Peer-to-Peer Systems and Applications (Lecture Notes in Computer Science) , 2005 .

[14]  Klaus Wehrle,et al.  Peer-to-Peer Systems and Applications , 2005, Peer-to-Peer Systems and Applications.

[15]  Tobias Hoßfeld,et al.  Mapping of file-sharing onto mobile environments: feasibility and performance of eDonkey with GPRS , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[16]  Heikki Hämmäinen,et al.  A handset‐based platform for measuring mobile service usage , 2007 .

[17]  Tobias Hoßfeld,et al.  Mapping of file-sharing onto mobile environments: enhancement by UMTS , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[18]  Craig Smith,et al.  Know Your Enemy : Passive Fingerprinting , 2001 .

[19]  Chuan Wu,et al.  Characterizing Peer-to-Peer Streaming Flows , 2007, IEEE Journal on Selected Areas in Communications.

[20]  Tobias Hoßfeld,et al.  Analysis of Skype VoIP traffic in UMTS: End-to-end QoS and QoE measurements , 2008, Comput. Networks.

[21]  Pascal Lorenz,et al.  Networking - ICN 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part I , 2005, ICN.

[22]  Diomidis Spinellis,et al.  A survey of peer-to-peer content distribution technologies , 2004, CSUR.

[23]  Ece Guran Schmidt,et al.  An intrusion detection based approach for the scalable detection of P2P traffic in the national academic network backbone , 2006, 2006 International Symposium on Computer Networks.

[24]  Satoshi Ohzahata,et al.  A Traffic Identification Method and Evaluations for a Pure P2P Application , 2005, PAM.

[25]  Chuan Wu,et al.  Diverse: application-layer service differentiation in peer-to-peer communications , 2007, IEEE Journal on Selected Areas in Communications.

[26]  Klaus Wehrle,et al.  What Is This "Peer-to-Peer" About? , 2005, Peer-to-Peer Systems and Applications.

[27]  Erwin P. Rathgeb,et al.  A Simple, Efficient and Flexible Approach to Measure Multi-protocol Peer-to-Peer Traffic , 2005, ICN.