A Measurement-Based Traffic Profile of the eDonkey Filesharing Service
نویسنده
چکیده
Peer-to-peer file sharing applications have evolved to one of the major traffic sources in the Internet. In particular, the eDonkey file sharing system and its derivatives are causing high amounts of traffic volume in today’s networks. The eDonkey system is typically used for exchanging very large files like audio/video CDs or even DVD images. In this report we provide a measurement based traffic profile of the eDonkey service. Furthermore, we discuss how this type of service increases the ”mice and elephants” phenomenon in the Internet traffic characteristics.
منابع مشابه
The eDonkey File-Sharing Network
The eDonkey 2000 file-sharing network is one of the most successful peerto-peer file-sharing applications, especially in Germany. The network itself is a hybrid peer-to-peer network with client applications running on the end-system that are connected to a distributed network of dedicated servers. In this paper we describe the eDonkey protocol and measurement results on network/transport layer ...
متن کاملInformation Diffusion in eDonkey Filesharing Networks
Peer-to-Peer (P2P) applications have become highly popular in today’s Internet due to the spread of file sharing platforms such as KaZaa, eDonkey, and BitTorrent. P2P technologies have emerged from disruptive, grey-scale applications to developments of business-cases. In this paper we investigate the diffusion behavior in an eDonkey-like system. We use nonstationary simulation techniques to inv...
متن کاملF-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management
Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...
متن کاملPeer-to-Peer Behaviour Detection by TCP Flows Analysis
The use of peer-to-peer (P2P) applications is growing dramatically. It concerns applications like Gnutella, Kazaa or eDonkey. These applications sometimes represent as most as 50% of Internet traffic. So, it became important for ISPs to detect these applications. As the TCP port can change, an identification based on TCP gate is not possible. Main goal of this work is to use knowledge about TCP...
متن کاملMeasuring Mobile Peer-to-Peer Usage: Case Finland 2007
We study the development of mobile peer-to-peer (MP2P) traffic and the usage of MP2P applications in Finland during 2005-2007. Research data consists of 1) traffic traces measured from three Finnish GSM/UMTS networks covering the Internet-bound mobile data traffic generated by 80-90% of Finnish mobile subscribers (N > 4,000,000), and 2) usage log files collected with a dedicated Symbian handset...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004