2003
DOI: 10.1145/1165389.945475
|View full text |Cite
|
Sign up to set email alerts
|

Measurement, modeling, and analysis of a peer-to-peer file-sharing workload

Abstract: Peer-to-peer (P2P) file sharing accounts for an astonishing volume of current Internet traffic. This paper probes deeply into modern P2P file sharing systems and the forces that drive them. By doing so, we seek to increase our understanding of P2P file sharing workloads and their implications for future multimedia workloads. Our research uses a three-tiered approach. First, we analyze a 200-day trace of over 20 terabytes of Kazaa P2P traffic collected at the University of Washington. Second, we develop a model… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

7
207
1
2

Year Published

2005
2005
2016
2016

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 380 publications
(217 citation statements)
references
References 21 publications
7
207
1
2
Order By: Relevance
“…Gummadi et al [8] consider clustering by file type. The authors, after analyzing large traces of P2P traffic, proposed a model of multimedia workloads aiming to explore the impact of key system parameters.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Gummadi et al [8] consider clustering by file type. The authors, after analyzing large traces of P2P traffic, proposed a model of multimedia workloads aiming to explore the impact of key system parameters.…”
Section: Related Workmentioning
confidence: 99%
“…Clustering techniques have attracted the attention of researchers from the P2P community due to their usefulness in developing efficient searching in P2P file sharing systems. Presently, three types of clustering techniques have been studied for P2P networks: locality-awareness clustering [9], clustering by file type [8] and clustering by content of textual files [10,18,22,27]. However, no studies have been carried out for clustering of multimedia files by content in P2P networks.…”
Section: Introductionmentioning
confidence: 99%
“…(2) overlay topology structure [4,27,28,5], (3) query traffic [6], (4) data traffic [29,25,30], and (5) shared files [7,8]. We are aware of only two other studies that focus on the characteristics of files shared by users.…”
Section: Related Workmentioning
confidence: 99%
“…Gummadi et al [29] analyzed a 200-day trace of Kazaa traffic collected at the University of Washington, demonstrating that file transfers in Kazaa do not follow a Zipf distribution and argued that this difference is due to the "fetch-at-most-once" nature of downloads in file-sharing applications. Another analysis of Kazaa traffic was conducted by Leibowitz et al [25] at a large Israeli ISP.…”
Section: Related Workmentioning
confidence: 99%
“…We simulate flooding search used in a Gnutella network by conducting the Breath First Search algorithm from a specific node. Basic settings of the workloads used in this simulation follow a 200-day trace of KaZaA P2P traffic collected at University of Washington [19].…”
Section: Performance Evaluationmentioning
confidence: 99%