期刊文献+

大规模网络中BitTorrent流行为分析 被引量:6

Analysis of BitTorrent flow behavior on large-scale networks
下载PDF
导出
摘要 在使用基于特征串方法准确采集国内最流行的P2P应用——BitTorrent应用流量的基础上,研究了BitTorrent应用的流长、流持续时间、流速以及端结点传输的流量、连接数等测度的分布,并分析了各分布中的异常情况.分析结果表明:BitTorrent应用流量已占网络总流量的60%;BitTorrent平均流长超过总体TCP流长的20倍;流长、流持续时间均服从Weibull分布,且二者行为相似;BitTorrent平均流速低于总体TCP流速,但随着流长的增长流速增快;BitTorrent网络有很强的不平衡性,约1%的结点贡献了80%的流量和连接数. A trace of BitTorrent application traffic, which is the most popular P2P(peer-to-peer) application in China, is accurately captured using payload-based method. Based on this trace, the distributions of BitTorrent flow length, flow duration, flow rate, the nodes' traffic volume and number of connections are studied, and the unusual circumstances of these distributions are analyzed. The re- suits show that BitTorrent application traffic account for 60% of the total traffic volume. The average flow length of BitTorrent application is 20 times longer than that of overall TCP flow. The distributions of the flow length and flow duration approximately accord with the Weibull distributions, and their behaviors are similar. The average flow rate is less than overall TCP flow; however with the flow length increases, the flow rate becomes faster. The BitTorrent network presents a strong imbalance, about 1% of the nodes contribute 80% of the total volume and connections.
作者 陈亮 龚俭
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第3期390-395,共6页 Journal of Southeast University:Natural Science Edition
基金 国家重点基础研究发展计划(973计划)资助项目(2003CB314804) 教育部科学技术重点研究资助项目(105084) 江苏省网络与信息安全重点实验室资助项目(BM2003201)
关键词 大规模网络 P2P BITTORRENT 流行为 流测度 large-scale network P2P (peer-to-peer) BitTorrent traffic behavior traffic measurement
  • 相关文献

参考文献10

  • 1Plissonneau L, Costeux J-L, Brown P. Analysis of Peer-to-Peer traffic on ADSL [C]//The 4th Annual Passive and Active Measurements Workshop. Boston, USA, 2005: 69 - 82.
  • 2Saroiu S, Gummadi P K, Gribble S D. A measurement study of Peer-to-Peer file sharing systems [C]//Multimedia Computing and Networking. San Jose, California, 2002: 156 - 170.
  • 3Sen S, Wang J. Analyzing Peer-to-Peer traffic across large networks [ C ]//The 2nd SIGCOMM Internet Measurement Workshop. Marseille, France, 2004:412 -419.
  • 4Izal M, Urvoy-Keller G, Biersack E W, et al. Dissecting BitTorrent: five months in a torrent's lifetime [C]//The 5 th Annual Passive and Active Measurement Workshop. Antibes Juan-les-Pins, France, 2004 : 1 - 11.
  • 5Tutschku K. A measurement-based traffic profile of the eDonkey file sharing service[C]//The 5th Annual Passive and Active Measurement Workshop. Antibes Juan-les-Pins, France, 2004 : 12 - 21.
  • 6张云飞,雷连虹,陈常嘉.Internet中Peer-to-Peer应用流量测量与分析[J].铁道学报,2004,26(5):55-60. 被引量:7
  • 7Fonseca J, Reza B, Fjeldsted L. BitTorrent protocol-BTP/1.0 [EB/OL]. (2005-04)[2005-12-15]. http ://jonas. nitro. dk/bittorrent/bittorrent-rfc. html.
  • 8Karagiannis T, Broido A, Brownlee N, et al. Is P2P dying or just hiding? [C]//IEEE Globecom. Dallas, Texas, 2004 : 1532 - 1538.
  • 9陈亮,龚俭,徐选.基于特征串的应用层协议识别[J].计算机工程与应用,2006,42(24):16-19. 被引量:43
  • 10Postel J. RFC 793-transmission control protocol[EB/ OL]. (1981-09) [2004-03-13]. http://www. faqs. org/rfcs/rfc793. html.

二级参考文献23

  • 1Sen S, Wang J. Analyzing peer-to-peer traffic across large network[A]. In: Proceedings of ACM Sigcomm Internet Measurement Workshop[C]. Marseille, France: Nov. 2002.
  • 2Saroiu S, Gummadi P K, Gribble S D. A Measurement Study of Peer-to-Peer File Sharing Systems[A]. In: Proceedings of Multimedia Computing and Networking [C]. Jan. 2002.
  • 3Leibowitz N, et al. Are File Swapping Networks Cacheable? Characterizing P2P Traffic[A]. In: Proceedings of 7th International Workshop on Web Content Caching and Distribution[C]. Aug. 2002.
  • 4B Krishnamurthy, J Wang, Y Xie. Early Measurements of a Clusterbased Architecture for P2P Systems[A]. In :Proceedings of ACM Sigcomm Internet Measurement Workshop[C]. Nov. 2001.
  • 5Netflow services and applications [EB/OL]. Http://www.cisco.com/warp/public/cc/pd/iosw/ioft/neflct/tech/napps wp.htm.
  • 6Vern Paxson, Sally Floyd. Wide-Area Traffic: The Failure of Poisson Modeling[J], IEEE/ACM Transactions on Networking,3(3), June 1995. 
  • 7Gwendolyn Mariano. Schools Declare File-Swapping Truce[J/OL]. Http://news.com.com/2100-1023-859705.html ]Gwendolyn Mariano. Schools Declare File-Swapping Truce. Http://news.com.com/2100-1023-859705.html
  • 8Duffield N, Lund C, Thorup M. Properties and Prediction of Flow Statistics from Sampled Packet Streams[A]. In :Proceedings of ACM Sigcomm Internet Measurement Workshop[C]. Marseille, France: Nov. 2002.
  • 9Hagiwara T, Doi H, Tode H, Ikeda H. High-Speed Calculation Method of Hurst Parameter Based On Real Traffic[A]. In: proc.IEEE Conference on Local Computer Networks (LCN 2000)[C]. Tampa Florida, U.S.A: Nov. 2000.
  • 10Zhang H F, Shu Y T, Yang O. Estimation of Hurst Parameter by Varariance-Time Plots[A]. In Proceedings. IEEE Pacrim[C], 1997.

共引文献48

同被引文献105

引证文献6

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部