Analyzing the Peer to Peer Traffic Aggregation Using an Optimized Method
نویسندگان
چکیده
Problem statement: In the recent years, peer to peer networks have rapidly developed in the distributed and decentralized world of internet. Current research indicated that P2P applications were responsible for a substantial part of Internet traffic. Number of users embracing new P2P technology is also increasing fast. It is therefore important to understand the impact of the new P2P services on the existing Internet infrastructure and on legacy applications. The majority of unidentified traffic originates from Peer-to-Peer (P2P) applications like Napster, Gnuttella. Identification of P2P traffic seem to fail because their existence by using arbitrary ports. Approach: Proposed scheme concentrated on the factors and characteristics of P2P communications with payload issues on P2P application based on network traffic collection. The method used here was based on a set of heuristics derived from the robust properties of P2P traffic. Results: System demonstrated the method with current traffic data obtained from internet service providers. It had been found that flow sizes Vs holding times, behavior of P2P users Vs total active users were also analyzed and results of a heavytail analysis were described. Finally, system discussed the popularity distribution properties of P2P applications. Conclusion/Recommendations: This study suggested a very interesting and important result from a traffic dimensioning point of view: The ratio of active users and total users is almost constant. Results showed that unique properties of P2P application traffic seem to fade away during aggregation and characteristics of traffic will be similar to that of other non-P2P traffic aggregation.
منابع مشابه
Identification and Analysis of Peer-to-Peer Traffic
Recent measurement studies report that a significant portion of Internet traffic is unknown. It is very likely that the majority of the unidentified traffic originates from peer-to-peer (P2P) applications. However, traditional techniques to identify P2P traffic seem to fail since these applications usually disguise their existence by using arbitrary ports. In addition to the identification of a...
متن کاملPeer Assessment in evaluation of Medical sciences students
Introduction: Recently, peer assessment is especially noticed as a progress evaluation method. Although it is a known method, it is a novel method in many countries that they use traditional methods. Then the topic of current review article is peer assessment in medical education. Methods: The documents related to peer assessment, advantages, disadvantages, applications and how use it extracte...
متن کاملGGRA: a grouped gossip-based reputation aggregation algorithm
An important issue in P2P networks is the existence of malicious nodes that decreases the performance of such networks. Reputation system in which nodes are ranked based on their behavior, is one of the proposed solutions to detect and isolate malicious (low ranked) nodes. Gossip Trust is an interesting previously proposed algorithm for reputation aggregation in P2P networks based on t...
متن کاملExplaining the characteristics of peer-to-peer learning: A qualitative study
Explaining the characteristics of peer-to-peer learning: A qualitative study Introduction: Learning through peers is an educational method. Explaining the characteristics of learning with the help of peers has not been done in a study, so the purpose of this study was to explain the characteristics of learning with the help of peers. Materials and Methods: This qualitative study was perfo...
متن کاملExperimental analysis of the impact of peer-to-peer applications on traffic in commercial IP networks
To evaluate the impact of peer-to-peer applications on traffic in wide area networks, we analyze measurements from a high speed IP backbone link carrying TCP traffic towards several ADSL areas. The first observations are that the prevalent part of traffic is due to peer-to-peer applications (almost 80% of total traffic) and that the usage of network becomes symmetric in the sense that customers...
متن کامل