Measurement on a Peer-to-Peer Package Management System for Linux Distributions

 Abstract—Peer-to-Peer(P2P) technique has been successfully used in many applications, especially P2P file sharing and P2P live stream. However, there are very few work that try to employ P2P to improve package management for Linux distributions. In this paper, we first introduce the principle of a P2P package management system and a popular implementation named apt-p2p. Then, we develop a crawler to record the information of a normal peer and a bootstrapping peer in apt-p2p network. We measure and analyze the routing table, database, network traffic and network delay for this package management network. Some interesting and valuable results were found in our measurement and the results shows that it is feasible and reliable to use P2P technique to support distributions package measurement.

[1]  Taoufik En-Najjary,et al.  Long Term Study of Peer Behavior in the kad DHT , 2009, IEEE/ACM Transactions on Networking.

[2]  Xiaoning Ding,et al.  Measurements, analysis, and modeling of BitTorrent-like systems , 2005, IMC '05.

[3]  Yongdae Kim,et al.  Why Kad lookup fails , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.

[4]  John Kubiatowicz,et al.  Handling churn in a DHT , 2004 .

[5]  Keith W. Ross,et al.  Measurement and mitigation of BitTorrent leecher attacks , 2009, Comput. Commun..

[6]  Krishna P. Gummadi,et al.  Measurement, modeling, and analysis of a peer-to-peer file-sharing workload , 2003, SOSP '03.

[7]  Raúl Jiménez,et al.  Connectivity properties of Mainline BitTorrent DHT nodes , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.

[8]  Zhoujun Li,et al.  Toward an Accurate Snapshot of DHT Networks , 2011, IEEE Communications Letters.

[9]  Mary K. Vernon,et al.  Characterizing the query behavior in peer-to-peer file sharing systems , 2004, IMC '04.

[10]  Daniel Stutzbach,et al.  Improving Lookup Performance Over a Widely-Deployed DHT , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[11]  Thomas E. Anderson,et al.  Profiling a million user dht , 2007, IMC '07.

[12]  Eric Neblock Peer-to-peer based package management , 2013 .

[13]  Zhoujun Li,et al.  ID Repetition in Structured P2P Networks , 2011, Comput. J..

[14]  Jiangchuan Liu,et al.  apt-p2p: A Peer-to-Peer Distribution System for Software Package Releases and Updates , 2009, IEEE INFOCOM 2009.

[15]  Taoufik En-Najjary,et al.  A global view of kad , 2007, IMC '07.

[16]  Jeff Morgan,et al.  A P2P-Based Architecture for Secure Software Delivery Using Volunteer Assistance , 2008, 2008 Eighth International Conference on Peer-to-Peer Computing.

[17]  Taoufik En-Najjary,et al.  Long Term Study of Peer Behavior in the kad DHT , 2009, IEEE/ACM Transactions on Networking.