The KaZaA Overlay: A Measurement Study

نویسندگان

  • Jian Liang
  • Rakesh Kumar
  • Keith W. Ross
چکیده

Both in terms of number of participating users and in traffic volume, KaZaA is one of the most important applications in the Internet today. Nevertheless, because KaZaA is proprietary and uses encryption, little is understood about KaZaA’s overlay structure and dynamics, its messaging protocol, and its index management. We have built two measurement apparatus the KaZaA Sniffing Platform and the KaZaA Probing Tool to unravel many of the mysteries behind KaZaA. We deploy the apparatus to study KaZaA’s overlay structure and dynamics, its neighbor selection, its use of dynamic port numbers to circumvent firewalls, and its index management. Although this study does not fully solve the KaZaA puzzle, it nevertheless leads to a coherent description of KaZaA and its overlay. Furthermore, we leverage the measurement results to set forth a number of key principles for the design of a successful unstructured P2P overlay. The measurement results and resulting design principles in this paper should be useful for future architects of P2P overlay networks as well as for engineers managing ISPs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Understanding KaZaA

Both in terms of number of participating users and in traffic volume, KaZaA is one of the most important applications in the Internet today. Nevertheless, because KaZaA is proprietary and uses encryption, little is understood about KaZaA’s protocol, architecture and signaling traffic. We have built a measurement platform for collecting and measuring KaZaA’s signaling traffic. These measurements...

متن کامل

On the Equivalence of Forward and Reverse Query Caching in Peer-to-Peer Overlay Networks

Peer-to-peer systems such as Gnutella and Kazaa are used by millions of people for sharing music and many other files over the Internet, and they account for a significant portion of the Internet traffic. The traffic in a peer-to-peer overlay network is different from that in WWW in that each peer is both a client and a server. This suggests that one can deploy a forward cache at the Internet g...

متن کامل

Peer-to-Peer Behaviour Detection by TCP Flows Analysis

The use of peer-to-peer (P2P) applications is growing dramatically. It concerns applications like Gnutella, Kazaa or eDonkey. These applications sometimes represent as most as 50% of Internet traffic. So, it became important for ISPs to detect these applications. As the TCP port can change, an identification based on TCP gate is not possible. Main goal of this work is to use knowledge about TCP...

متن کامل

Delay Analysis of a Chord-based Peer-to-Peer File-Sharing System

In recent years emerging file sharing systems like Gnutella, eDonkey, Overnet, and Kazaa strongly influenced the behaviour of Internet traffic. These platforms employ different peer-to-peer mechanisms, where the application areas are just beginning to shift from undemanding content sharing towards new business case services. Those new requirements brought out new Peer-to-Peer overlay architectu...

متن کامل

Deconstructing the Kazaa Network

Internet traffic is experiencing a shift from web traffic to file swapping traffic. Today a significant part of Internet traffic is generated by peer-to-peer applications, mostly by the popular Kazaa application. Yet, to date, few studies analyze Kazaa traffic, thus leaving the bulk of Internet traffic in dark. We present a large-scale investigation of Kazaa traffic based on logs collected at a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004