Measuring Mobile Peer-to-Peer Usage: Case Finland 2007

نویسندگان

  • Mikko V. J. Heikkinen
  • Antero Kivi
  • Hannu Verkasalo
چکیده

We study the development of mobile peer-to-peer (MP2P) traffic and the usage of MP2P applications in Finland during 2005-2007. Research data consists of 1) traffic traces measured from three Finnish GSM/UMTS networks covering the Internet-bound mobile data traffic generated by 80-90% of Finnish mobile subscribers (N > 4,000,000), and 2) usage log files collected with a dedicated Symbian handset monitoring application (N = 579). In the traffic trace measurement, we notice almost zero P2P file sharing traffic for handsets, but 9-18% of unidentified traffic, part of which possibly being P2P traffic. Potentially a notable growing trend for computer-based P2P file sharing traffic is visible in GSM/UMTS networks, BitTorrent and eDonkey being the most popular protocols. In the panel study, only Fring, a client to several P2P-based communication services, has significant usage and data volume levels.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Usage Patterns of Mobile Subscribers: Regulatory Observations in Finland

Regulators need accurate data on service usage in addition to general information on markets and technology. This study presents a new type of tool, handset-based monitoring, for collecting and analyzing detailed data on usage patterns of mobile subscribers. Results of a panel organized in Finland are described and mapped to the relevant regulatory issues. Observations indicate that Finnish sub...

متن کامل

TAC: A Topology-Aware Chord-based Peer-to-Peer Network

Among structured Peer-to-Peer systems, Chord has a general popularity due to its salient features like simplicity, high scalability, small path length with respect to network size, and flexibility on node join and departure. However, Chord doesn’t take into account the topology of underlying physical network when a new node is being added to the system, thus resulting in high routing late...

متن کامل

Customizing Cyberspace: Methods for User Representation and Prediction

Cyberspace plays an increasingly important role in people’s life due to its plentiful offering of services and information, e.g. the Word Wide Web, the Mobile Web and Online Games. However, the usability of cyberspace services is frequently reduced by its lack of customization according to individual needs and preferences. In this thesis we address the cyberspace customization issue by focusing...

متن کامل

Mobile P2P in Ad Hoc Networks: Framework and Applications

Mobile devices are becoming an increasingly indispensable part of people’s everyday life, in the form of mobile phones, PDAs, and laptop computers. Especially kids have embraced mobile phones and excel in using them for maintaining and extending their social networks both over distance and in physical proximity. The extensive use of mobile phones by kids have in some situations resulted in bann...

متن کامل

Adaptive searching and replication of images in mobile hierarchical peer-to-peer networks

Due to the limitation of resources in mobile handheld devices and bandwidth constraints in wireless networks, it is important to efficiently manage image content and traffic to improve network throughput and response time. The efficient distribution of images in wireless networks is based on many parameters like the quality of service requirement, available bandwidth, restricted memory and dive...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009