Research on Measurement of Peer-to-Peer File Sharing System

With the progress of peer-to-peer (P2P) technology, the Internet applications model is in a great reformation. In order to get an all-win solution among the Internet users, Internet service providers and content providers, it is necessary to measure and analyze the P2P applications from their perspectives. In this paper, the content of P2P measurement is introduced firstly, and then the existing research on P2P measurement is classified into 3 areas: topology measurement, traffic measurement and availability measurement. After comparing between measurement methods, the comprehensive survey on P2P measurement is given, and then the existing measurements and their results are analyzed in depth, furthermore, the shortcomings and problems are outlined. In the end, the future trend of the P2P measurement is discussed.

[1]  Hermann de Meer,et al.  Cross-Layer Peer-to-Peer Traffic Identification and Optimization Based on Active Networking , 2009, IWAN.

[2]  Sally Floyd,et al.  Wide area traffic: the failure of Poisson modeling , 1995, TNET.

[3]  Fabrice Guillemin,et al.  IP Traffic Classification via Blind Source Separation Based on Jacobi Algorithm , 2004, ECUMN.

[4]  Stefan Savage,et al.  Understanding Availability , 2003, IPTPS.

[5]  Daniel Stutzbach,et al.  Characterizing unstructured overlay topologies in modern P2P file-sharing systems , 2008, TNET.

[6]  Thomas Fuhrmann,et al.  Measuring Large Overlay Networks - The Overnet Example , 2005, KiVS.

[7]  D. Stutzbach Characterizing Churn in Peer-to-Peer Networks , .

[8]  M. Jovanovi MODELING PEER-TO-PEER NETWORK TOPOLOGIES THROUGH “ SMALL-WORLD ” MODELS AND POWER LAWS , 2001 .

[9]  Sebastian Zander,et al.  Automated traffic classification and application identification using machine learning , 2005, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l.

[10]  Michalis Faloutsos,et al.  Transport layer identification of P2P traffic , 2004, IMC '04.

[11]  Ian T. Foster,et al.  Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design , 2002, ArXiv.

[12]  Gang Liu,et al.  Explaining BitTorrent Traffic Self-Similarity , 2004, PDCAT.

[13]  A. Weigend,et al.  Content Availability , Pollution and Poisoning in Peer-to-Peer File Sharing Networks ∗ , 2004 .

[14]  Keith W. Ross,et al.  The KaZaA Overlay : A Measurement Study , 2004 .

[15]  Chae-Woo Lee,et al.  Analysis and Modeling of Traffic from Residential High Speed Internet Subscribers , 2004, ICOIN.

[16]  Michele Colajanni,et al.  Peer-to-peer workload characterization: techniques and open issues , 2004, 2004 International Workshop on Hot Topics in Peer-to-Peer Systems.

[17]  Krishna P. Gummadi,et al.  Measuring and analyzing the characteristics of Napster and Gnutella hosts , 2003, Multimedia Systems.

[18]  Rakesh Kumar,et al.  Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[19]  Krishna P. Gummadi,et al.  Measurement, modeling, and analysis of a peer-to-peer file-sharing workload , 2003, SOSP '03.

[20]  Oliver Spatscheck,et al.  Accurate, scalable in-network identification of p2p traffic using application signatures , 2004, WWW '04.

[21]  Patrick Brown,et al.  Analysis of Peer-to-Peer Traffic on ADSL , 2005, PAM.

[22]  Michalis Faloutsos,et al.  BLINC: multilevel traffic classification in the dark , 2005, SIGCOMM '05.

[23]  Michalis Faloutsos,et al.  Is P2P dying or just hiding? [P2P traffic measurement] , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[24]  Chen Changjia Characterizing Peer-to-Peer Traffic Across Internet , 2004 .

[25]  Jacky C. Chu,et al.  Availability and locality measurements of peer-to-peer file systems , 2002, SPIE ITCom.

[26]  Stefan Saroiu,et al.  A Measurement Study of Peer-to-Peer File Sharing Systems , 2001 .

[27]  Rakesh Kumar,et al.  Understanding KaZaA , 2004 .

[28]  C. Soldani,et al.  Peer-to-Peer Behaviour Detection by TCP Flows Analysis , 2004 .

[29]  Jia Wang,et al.  Analyzing peer-to-peer traffic across large networks , 2004, IEEE/ACM Trans. Netw..