Analyzing Peer-to-Peer Traffic Across Large Networks Jia Wang Joint work with Subhabrata Sen AT&T Labs - Research.

Slides:



Advertisements
Similar presentations
A Measurement Study of Peer-to-Peer File Sharing Systems Presented by Cristina Abad.
Advertisements

Traffic Dynamics at a Commercial Backbone POP Nina Taft Sprint ATL Co-authors: Supratik Bhattacharyya, Jorjeta Jetcheva, Christophe Diot.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Understanding KaZaA Jian Liang Rakesh Kumar Keith Ross Polytechnic University Brooklyn, N.Y.
Review of a research paper on Skype
1 BGP Anomaly Detection in an ISP Jian Wu (U. Michigan) Z. Morley Mao (U. Michigan) Jennifer Rexford (Princeton) Jia Wang (AT&T Labs)
Streaming Video Traffic: Characterization and Network Impact Kobus van der Merwe Shubho Sen Chuck Kalmanek
1 Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Jian Wu (University of Michigan) Z. Morley Mao (University.
An Analysis of Internet Content Delivery Systems Stefan Saroiu, Krishna P. Gommadi, Richard J. Dunn, Steven D. Gribble, and Henry M. Levy Proceedings of.
 We developed a fast and tunable crawler, Cruiser.  Cruiser uses a master-slave architecture, parallel crawling, and leverages the two-tier topology.
Measurement, Modeling, and Analysis of a Peer-to-Peer File sharing Workload Krishna P. Gummadi, Richard J. Dunn, Stefan Saroiu, Steven D. Gribble, Henry.
Traffic Engineering for ISP Networks Jennifer Rexford Internet and Networking Systems AT&T Labs - Research; Florham Park, NJ
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Network Traffic Measurement and Modeling CSCI 780, Fall 2005.
1 Deriving Traffic Demands for Operational IP Networks: Methodology and Experience Anja Feldmann*, Albert Greenberg, Carsten Lund, Nick Reingold, Jennifer.
Who Talks to Whom: Using BGP Data for Scaling Interdomain Resource Reservation Ping Pan and Henning Schulzrinne Columbia University ISMA Workshop – Leiden,
Dynamics of Hot-Potato Routing in IP Networks Renata Teixeira (UC San Diego) with Aman Shaikh (AT&T), Tim Griffin(Intel),
An Analysis of Internet Content Delivery Systems Stefan Saroiu, Krishna.
Graphs and Topology Yao Zhao. Background of Graph A graph is a pair G =(V,E) –Undirected graph and directed graph –Weighted graph and unweighted graph.
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
1 Deriving Traffic Demands for Operational IP Networks: Methodology and Experience Anja Feldmann*, Albert Greenberg, Carsten Lund, Nick Reingold, Jennifer.
Review of Free Riding on Gnutella Eytan Adar and Bernardo Huberman Shreeram Sahasrabudhe.
1 Performance Evaluation of Ring- based Peer-to-Peer Virtual Private Network (RING-P2P-VPN) Hiroyuki Ohsaki Graduate School of Information Sci. & Tech.
Measurements of Peer-to-Peer Systems Pradnya Karbhari Nov 25 th, 2003 CS 8803: Network Measurements Seminar.
Computer Concepts 2014 Chapter 6 The Internet. 6 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet Access Chapter 6: The Internet2.
KaZaA: Behind the Scenes Shreeram Sahasrabudhe Lehigh University
P2P File Sharing Systems
Introduction Widespread unstructured P2P network
1 Reading Report 4 Yin Chen 26 Feb 2004 Reference: Peer-to-Peer Architecture Case Study: Gnutella Network, Matei Ruoeanu, In Int. Conf. on Peer-to-Peer.
Differences between In- and Outbound Internet Backbone Traffic Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering Chalmers University.
Peer to Peer Network Anas Hardan. What is a Network? What is a Network? A network is a group of computers and other devices (such as printers) that are.

 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
Network Sensitivity to Hot-Potato Disruptions Renata Teixeira (UC San Diego) with Aman Shaikh (AT&T), Tim Griffin(Intel),
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
Traffic Engineering for ISP Networks Jennifer Rexford Internet and Networking Systems AT&T Labs - Research; Florham Park, NJ
Skype P2P Kedar Kulkarni 04/02/09.
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
1 CS 425 Distributed Systems Fall 2011 Slides by Indranil Gupta Measurement Studies All Slides © IG Acknowledgments: Jay Patel.
Networks CS105. What is a computer network? A computer network is a collection of computing devices that are connected in various ways so that they can.
Traffic Engineering for ISP Networks Jennifer Rexford Internet and Networking Systems AT&T Labs - Research; Florham Park, NJ
1 Analyzing Peer-To-Peer Traffic Across Large Networks Subhabrata Sen, Member, IEEE, and Jia Wang, Member, IEEE 組員:李英宗 d 林慶和 d 年 6.
Othman Othman M.M., Koji Okamura Kyushu University 1.
Understanding KaZaA Jian Liang Rakesh Kumar Keith Ross Polytechnic University Brooklyn, N.Y.
BGP topics to be discussed in the next few weeks: –Excessive route update –Routing instability –BGP policy issues –BGP route slow convergence problem –Interaction.
A Measurement Study on the Impact of Routing Events on End-to-End Internet Path Performance Feng Wang 1, Zhuoqing Morley Mao 2 Jia Wang 3, Lixin Gao 1,
On Understanding of Transient Interdomain Routing Failures Feng Wang, Lixin Gao, Jia Wang, and Jian Qiu Department of Electrical and Computer Engineering.
FastTrack Network & Applications (KaZaA & Morpheus)
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
April 4th, 2002George Wai Wong1 Deriving IP Traffic Demands for an ISP Backbone Network Prepared for EECE565 – Data Communications.
Exploiting Network Structure for Proactive Spam Mitigation Shobha Venkataraman * Joint work with Subhabrata Sen §, Oliver Spatscheck §, Patrick Haffner.
정하경 MMLAB Fundamentals of Internet Measurement: a Tutorial Nevil Brownlee, Chris Lossley, “Fundamentals of Internet Measurement: a Tutorial,” CMG journal.
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
BGP Routing Stability of Popular Destinations Jennifer Rexford, Jia Wang, Zhen Xiao, and Yin Zhang AT&T Labs—Research Florham Park, NJ All flaps are not.
Performance Limitations of ADSL Users: A Case Study Matti Siekkinen, University of Oslo Denis Collange, France Télécom R&D Guillaume Urvoy-Keller, Ernst.
An Analysis of Internet Content Delivery Systems 19 rd November, 2007 Youngsub CSE, SNU.
#16 Application Measurement Presentation by Bobin John.
1 Internet Traffic Measurement and Modeling Carey Williamson Department of Computer Science University of Calgary.
1 Netflow Collection and Aggregation in the AT&T Common Backbone Carsten Lund.
PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services Ming Zhang, Chi Zhang Vivek Pai, Larry Peterson, Randy Wang Princeton.
BGP Routing Stability of Popular Destinations
Jian Wu (University of Michigan)
Early Measurements of a Cluster-based Architecture for P2P Systems
A Measurement Study of Napster and Gnutella
Transport Layer Identification of P2P Traffic
Presentation transcript:

Analyzing Peer-to-Peer Traffic Across Large Networks Jia Wang Joint work with Subhabrata Sen AT&T Labs - Research

Analyzing peer-to-peer traffic accoss large networks2 P2P applications Distributed file sharing Distributed file sharing  Napster, Gnutella, FastTrack, EDonkey, DirectConnect…  Searching v.s. data fetching phases  All the communications occur over default ports  SuperNodes and Hubs Why is this interesting? Why is this interesting?  Large and growing traffic volume

Analyzing peer-to-peer traffic accoss large networks3 Outline Methodology Methodology  Data collection  Characterization metrics Analysis results Analysis results  Traffic volume and overlay topology  System dynamics  Traffic characterization P2P vs Web P2P vs Web

Analyzing peer-to-peer traffic accoss large networks4 Methodology Challenges Challenges  Decentralized system  Transient peer membership  Some popular close proprietary protocols Large-scale passive measurement Large-scale passive measurement  Flow-level data from routers across a large tier-1 ISP backbone  Analyze both signaling and data fetching traffic  3 levels of granularity: IP, Prefix, AS P2P protocols P2P protocols  FastTrack:1214 (including Morpheus)  Gnutella:6346/6347  DirectConnect:411/412

Analyzing peer-to-peer traffic accoss large networks5 Methodology Discussion Advantages Advantages  Requires minimal knowledge of P2P protocols: port number  Large scale non-intrusive measurement  More complete view of P2P traffic  Allows localized analysis Limitations Limitations  Flow-level data: no application-level details  Incomplete traffic flows Other issues Other issues  DHCP, NAT, proxy  Host  IP  Asymmetric IP routing

Analyzing peer-to-peer traffic accoss large networks6 Measurements Characterization Characterization  Overlay network topology  Traffic distribution  Dynamic behavior Metrics Metrics  Host distribution  Host connectivity  Traffic volume  Mean bandwidth usage  Traffic pattern over time  Connection duration and on-time

Analyzing peer-to-peer traffic accoss large networks7 Data cleaning Invalid IPs Invalid IPs    No matched prefixes in routing tables No matched prefixes in routing tables Invalid AS numbers Invalid AS numbers  > Removed 4% flows Removed 4% flows

Analyzing peer-to-peer traffic accoss large networks8 Overview of P2P traffic Total 800 million flow records Total 800 million flow records FastTrack is the most popular one FastTrack is the most popular one Date (2001) 9/10-9/1510/9-10/1312/10-12/16 # flows 111M184M341M # IPs 3.4M4.5M5.9M # IPs / day 1M1.5M1.9M Total traffic (GB/day) Traffic per IP (MB/day)

Analyzing peer-to-peer traffic accoss large networks9 Host distribution

Analyzing peer-to-peer traffic accoss large networks10 Host connectivity Connectivity is very small for most hosts, very high for few hosts Distribution is less skewed at prefix and AS levels FastTrack (9/14/2001)

Analyzing peer-to-peer traffic accoss large networks11 Traffic volume distribution Significant skews in traffic volume across granularities  Few entities source most of the traffic  Few entities receive most of the traffic FastTrack (9/14/2001)

Analyzing peer-to-peer traffic accoss large networks12 Mean bandwidth usage Upstream usage < downstream usage. Possible causes are  Asymmetric available BW, e.g., DSL, cable  Users/ISPs rate-limiting upstream data transfers FastTrack (9/14/2001)

Analyzing peer-to-peer traffic accoss large networks13 Time of day effect  Traffic volume exhibits very strong time-of-day effect  Milder time-of-day variation for # hosts in the system FastTrack (9/14/2001 GMT)

Analyzing peer-to-peer traffic accoss large networks14 Host connection duration & on-time  Substantial transience: most hosts stay in the system for a short time  Distribution less skewed at the prefix and AS levels  Using per-cluster or per-AS indexing/caching nodes may help FastTrack (9/14/2001) thd=30min

Analyzing peer-to-peer traffic accoss large networks15 Traffic characterization The power law The power law  May not be a suitable model for P2P traffic Relationship between metrics Relationship between metrics  Traffic volume  Number of IPs  On-time  Mean bandwidth usage

Analyzing peer-to-peer traffic accoss large networks16 Traffic volume vs. on-time 1. Volume heavy hitters tend to have long on-times 2. Hosts with short on-times contribute small traffic volumes FastTrack (9/14/2001): top 1% hosts (73% volume) 1 2

Analyzing peer-to-peer traffic accoss large networks17 Connectivity vs. on-time FastTrack (9/14/2001): top 1% hosts (73% volume) 1.Hosts with high connectivity have long on-times 2.Hosts with short on-times communicate with few other hosts 1 2

Analyzing peer-to-peer traffic accoss large networks18 P2P vs Web Observations Observations  97% of prefixes contributing P2P traffic also contribute Web traffic  Heavy hitter prefixes for P2P traffic tend to be heavy hitters for Web traffic Prefix stability – the daily traffic volume (in %) from the prefix does not change over days Prefix stability – the daily traffic volume (in %) from the prefix does not change over days Experiments: 0.1%, 10% heavy hitters => 30%, 90% of the traffic volume Experiments: 0.01%, 0.1%, 1%, 10% heavy hitters => 10%, 30%, 50%, 90% of the traffic volume

Analyzing peer-to-peer traffic accoss large networks19 Traffic stability March 2002 Top 0.01% prefixesTop 1% prefixes P2P traffic contributed by the top heavy hitter prefixes is more stable than either Web or total traffic

Analyzing peer-to-peer traffic accoss large networks20 Summary Measure and characterize P2P traffic across a large network Measure and characterize P2P traffic across a large network Three popular P2P systems Three popular P2P systems  Significant increase in both number of users and traffic volume  Traffic distributions are highly skewed  High level system dynamics  P2P is significant, but stable component of the Internet traffic

Analyzing peer-to-peer traffic accoss large networks21 Acknowledgement AT&T Labs AT&T Labs  Matt Grossglauser, Carsten Lund, Jennifer Rexford, Matt Roughan, Fred True External External  Steve Gribble