A random graph model for massive graphs
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Beyond folklore: observations on fragmented traffic
IEEE/ACM Transactions on Networking (TON)
IEEE Internet Computing
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Can Heterogeneity Make Gnutella Scalable?
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Why Peer-to-Peer (P2P) Does Scale: An Analysis of P2P Traffic Patterns
P2P '02 Proceedings of the Second International Conference on Peer-to-Peer Computing
An analysis of Internet content delivery systems
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
The Deployment of Cache Servers in P2P Networks for Improved Performance in Content-Delivery
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Analyzing peer-to-peer traffic across large networks
IEEE/ACM Transactions on Networking (TON)
Scaling Unstructured Peer-to-Peer Networks With Multi-Tier Capacity-Aware Overlay Topologies
ICPADS '04 Proceedings of the Parallel and Distributed Systems, Tenth International Conference
Modeling and performance analysis of BitTorrent-like peer-to-peer networks
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Free-riding and whitewashing in peer-to-peer systems
Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems
A Framework for Automatic and Secure Cycle Stealing
HPCASIA '04 Proceedings of the High Performance Computing and Grid in Asia Pacific Region, Seventh International Conference
Analysis and Application of Passive Peer Influence on Peer-to-Peer Inter-Domain Traffic
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
The Effect of Heterogeneous Link Capacities in BitTorrent-Like File Sharing Systems
HOT-P2P '04 Proceedings of the 2004 International Workshop on Hot Topics in Peer-to-Peer Systems
Content availability, pollution and poisoning in file sharing peer-to-peer networks
Proceedings of the 6th ACM conference on Electronic commerce
Can unstructured P2P protocols survive flash crowds?
IEEE/ACM Transactions on Networking (TON)
Characterizing unstructured overlay topologies in modern P2P file-sharing systems
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
The bittorrent p2p file-sharing system: measurements and analysis
IPTPS'05 Proceedings of the 4th international conference on Peer-to-Peer Systems
Network Security
Hi-index | 0.24 |
Peer-to-peer (p2p) content sharing and distribution has become of such widespread use that various user communities, even quite large ones, have formed and may exhibit specific behaviors. The main aspects characterizing the latter may stem from users' interest groups, specific attitudes, or even from locality reasons - e.g., lying behind a network access translation (NAT) protected Internet access, which is responsible for the reduction in transparency of end-to-end applications. We investigate the traffic patterns of one such community, adopting the eMule protocol, by means of an extensive data collection, which was made possible by the deployment of a modified eMule client interface among the customers of a national Internet service provider (ISP). We discuss the modifications introduced, and analyze the interaction among peers within the community, as well as the interaction of community members with the rest of the world, on the basis of the volumes exchanged. Our conclusions indicate that: (i) ''client-side'' analysis is effective to quantify the impact of file-sharing applications over the network; (ii) the presence of NAT devices accounts for misbehaving of p2p applications; (iii) by performing modifications it is possible to sensibly adjust the fairness of a file-sharing service; (iv) the eMule implementation suffers of some design choices that impede the full exploitation of the available resources.