Download presentation
Presentation is loading. Please wait.
Published byMelody Millman Modified over 9 years ago
1
Managing P2P Applications or Where Did My Internet Bandwidth Go? David L. Merrifield University of Arkansas dlm@uark.edu June 19, 2003
2
The First Peer-to-Peer (P2P) Application Widely Accepted by the Internet Public
3
May 1999 – Napster created by Northeastern University students Shawn Fanning and Sean Parker and takes the college world by storm December 7, 1999 – RIAA sues Napster on grounds of copyright infringement April 13, 2000 – Metallica files suit against Napster and three universities for copyright infringement
4
May 5, 2000 – Judge rules that Napster is in violation of DMCA October 31, 2000 – Napster announces that it will partner with Bertelsmann AG to develop subscription-based distribution March 2001 – Napster attempts file blocking and filtering techniques to eliminate copyrighted material from distribution
5
July 2001 – Judge orders Napster offline until copyrighted material is removed entirely October 2001 – Napster begins self destructing March 2002 – Federal appeals court orders Napster offline September 2002 – Judge blocks sale of Napster to Bertelsmann
6
November 2002 – Roxio bought Napster’s name and technology in bankruptcy auction for $5M Napster may be gone, but it was only the beginning…
8
What is the P2P Problem? MP3
9
What is the P2P Problem? MP3
10
What is the P2P Problem? More inbound than outbound traffic Double-Humped Curve
11
What is the P2P Problem? Near 100% outbound utilizationMore evening activity
12
Steps to Managing P2P Use Ignore the problem Management by written policy Port blocking Rate limiting Bandwidth quotas QoS
13
Ignore The Problem Disruptive to your legitimate users Consumes your expensive bandwidth Presents security exposures Presents copyright issues
14
Management by Written Policy Thou Shalt Not… P2P
15
Port Blocking Port blocking as a means to block P2P applications Not effective for all P2P applications Some P2P apps use other well-known ports, such as port 80 (web) Some P2P apps negotiate ports, so actual ports used are not predictable
16
Rate Limiting Limit the abusing users –Set limit on individual or total throughput Limit the abusing applications –Set limit on application throughput
17
Rate Limiting University of Arkansas Experience –September 2001 –Outbound Bandwidth at Max Most of Day –High Packet Drop Rates –Very Poor Internet Performance –No One Was Happy
18
Rate Limiting University of Arkansas Experience –November 2001 –Implemented Committed Access Rate (CAR) on Cisco 7507 Border Router –Limited Aggregate Dorm Traffic to 5 Mbps UARK Internet Bandwidth Blue Line Outbound Traffic Green Solid Inbound Traffic
19
Rate Limiting University of Arkansas Experience UARK Internet Outbound Packet Rate UARK Ping Statistics Blue Line Outbound Packet Rate Green Solid Outbound Packet Drops
20
Rate Limiting University of Arkansas Experience –Beware that some routers experience high CPU utilizations and performance is degraded when rate limiting is being done. Router CPU Utilization Router CPU usage increased 20% when CAR was enabled on Cisco 7507
21
Bandwidth Quotas Bruce Curtis, North Dakota State University Implemented bandwidth quotas for residence halls Every user is authenticated before they can use the network Bandwidth utilization is measured via flow data collected at border router
22
Bandwidth Quotas Authentication Server Internet 1. User authenticates Flow Data Collector
23
Bandwidth Quotas Flow Data Collector 2. User queued to use high-speed Internet pipe Internet Authentication Server
24
Bandwidth Quotas Flow Data Collector Internet Authentication Server 3. If user exceeds bandwidth quota, queued to use low-speed pipe Over Quota!!!
25
Bandwidth Quotas Fair share quota established for every user 300 MB per day If limit exceeded, user is placed in a rate- limiting pool (aggregate limit of 300 Kbps) About 15% of users regularly exceed limit Limits are reset daily at 6:00 A.M.
26
Quality of Service Use external device to manage traffic by application or user or both Build and apply policies about the way applications and users use bandwidth Quality of Disservice
27
Quality of Service Two major competitors –Packeteer PacketShaper –Allot NetEnforcer
28
Quality of Service Internet Border Router Firewall LAN
29
Quality of Service Classify traffic by: –Application signature –Protocol –Port number –Subnet –URL –Host name –LDAP host list –Diffserv setting –802.1p/q –MPLS tag –IP precedence bits –IP or MAC address –Direction (in vs. out) –Source –Destination –MIME type –Web browser –Oracle database
30
Quality of Service Shape traffic –Per application minimum –Per application maximum –Per session minimum –Per session maximum –Dynamic per-user minimum & maximum –TCP & UDP rate control –DoS attack avoidance
31
Quality of Service Sample configuration –Group P2P apps (KaZaa, Morpheus, eDonkey, BearShare, etc.) into one class –Limit the P2P class to 15% of capacity of inbound Internet link –Limit the P2P class to 5% of capacity of outbound Internet link
32
Packeteer
33
Packeteer
34
Packeteer
35
Packeteer PacketShaper Series15502500450065008500 Max Throughput (Mbps) 21045100200 Max Classes 2565125121,0242,048 Max Dynamic Partitions 1285125125,00020,000 Max Static Partitions 1282562565121,024 Max Policies 2565125121,0242,048 Max IP Hosts 5,00010,00025,00025,000100,000 Max IP Flows 7,50030,00075,000150,000300,000
36
Allot NetEnforcer ModelBandwidthPipesPoliciesConnections AC-102/128128 Kbps1281,0246,000 AC-102/512512 Kbps1281,0246,000 AC-202/2M2 Mbps2562,04812,000 AC-202/10M10 Mbps5122,04820,000 AC-30245 Mbps1,0244,09664,000 AC-402100 Mbps1,0244,09696,000 AC-601100 Mbps2,0488,192128,000 AC-702155 Mbps2,0488,192128,000 AC-802310 Mbps2,0488,192128,000
37
Conclusion P2P applications are here to stay Legality and copyright issues aside, the network bandwidth consumed can overwhelm most networks Management by decree may work in small environments, but not large ones Effective management techniques usually involve bandwidth shaping or quotas
38
The End Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.