[1]陈亮,龚俭.大规模网络中BitTorrent流行为分析[J].东南大学学报(自然科学版),2008,38(3):390-395.[doi:10.3969/j.issn.1001-0505.2008.03.006]
 Chen Liang,Gong Jian.Analysis of BitTorrent flow behavior on large-scale networks[J].Journal of Southeast University (Natural Science Edition),2008,38(3):390-395.[doi:10.3969/j.issn.1001-0505.2008.03.006]
点击复制

大规模网络中BitTorrent流行为分析()
分享到:

《东南大学学报(自然科学版)》[ISSN:1001-0505/CN:32-1178/N]

卷:
38
期数:
2008年第3期
页码:
390-395
栏目:
计算机科学与工程
出版日期:
2008-05-20

文章信息/Info

Title:
Analysis of BitTorrent flow behavior on large-scale networks
作者:
陈亮 龚俭
东南大学计算机科学与工程学院, 南京 210096; 江苏省计算机网络技术重点实验室, 南京 210096
Author(s):
Chen Liang Gong Jian
School of Computer Science and Engineering, Southeast University, Nanjing 210096, China
Jiangsu Province Key Laboratory of Computer Networking Technology, Nanjing 210096, China
关键词:
大规模网络 P2P BitTorrent 流行为 流测度
Keywords:
large-scale network P2P(peer-to-peer) BitTorrent traffic behavior traffic measurement
分类号:
TP393
DOI:
10.3969/j.issn.1001-0505.2008.03.006
摘要:
在使用基于特征串方法准确采集国内最流行的P2P应用——BitTorrent应用流量的基础上,研究了BitTorrent应用的流长、流持续时间、流速以及端结点传输的流量、连接数等测度的分布,并分析了各分布中的异常情况.分析结果表明:BitTorrent应用流量已占网络总流量的60%; BitTorrent平均流长超过总体TCP流长的20倍; 流长、流持续时间均服从Weibull分布,且二者行为相似; BitTorrent平均流速低于总体TCP流速,但随着流长的增长流速增快; BitTorrent网络有很强的不平衡性,约1%的结点贡献了80%的流量和连接数.
Abstract:
A trace of BitTorrent application traffic, which is the most popular P2P(peer-to-peer)application in China, is accurately captured using payload-based method. Based on this trace, the distributions of BitTorrent flow length, flow duration, flow rate, the nodes’ traffic volume and number of connections are studied, and the unusual circumstances of these distributions are analyzed. The results show that BitTorrent application traffic account for 60% of the total traffic volume. The average flow length of BitTorrent application is 20 times longer than that of overall TCP flow. The distributions of the flow length and flow duration approximately accord with the Weibull distributions, and their behaviors are similar. The average flow rate is less than overall TCP flow; however with the flow length increases, the flow rate becomes faster. The BitTorrent network presents a strong imbalance, about 1% of the nodes contribute 80% of the total volume and connections.

参考文献/References:

[1] Plissonneau L,Costeux J-L,Brown P.Analysis of Peer-to-Peer traffic on ADSL[C] //The 4th Annual Passive and Active Measurements Workshop.Boston,USA,2005:69-82.
[2] Saroiu S,Gummadi P K,Gribble S D.A measurement study of Peer-to-Peer file sharing systems[C] //Multimedia Computing and Networking.San Jose,California,2002:156-170.
[3] Sen S,Wang J.Analyzing Peer-to-Peer traffic across large networks[C] //The 2nd SIGCOMM Internet Measurement Workshop.Marseille,France,2004:412-419.
[4] Izal M,Urvoy-Keller G,Biersack E W,et al.Dissecting BitTorrent:five months in a torrent’s lifetime[C] //The 5th Annual Passive and Active Measurement Workshop.Antibes Juan-les-Pins,France,2004:1-11.
[5] Tutschku K.A measurement-based traffic profile of the eDonkey file sharing service[C] //The 5th Annual Passive and Active Measurement Workshop.Antibes Juan-les-Pins,France,2004:12-21.
[6] 张云飞,雷连虹,陈常嘉.Internet中Peer-to-Peer应用流量测量与分析[J].铁道学报,2004,26(5):55-60.
  Zhang Yunfei,Lei Lianhong,Chen Changjia.Characterizing Peer-to-Peer traffic across Internet[J].Journal of the China Railway Society,2004,26(5):55-60.(in Chinese)
[7] Fonseca J, Reza B,Fjeldsted L.BitTorrent protocol—BTP/1.0 [EB/OL].(2005-04)[2005-12-15].http://jonas.nitro.dk/bittorrent/bittorrent-rfc.html.
[8] Karagiannis T,Broido A,Brownlee N,et al.Is P2P dying or just hiding?[C] //IEEE Globecom.Dallas,Texas,2004:1532-1538.
[9] 陈亮, 龚俭,徐选.基于特征串的应用层协议识别[J].计算机工程与应用,2006,42(24):16-19.
  Chen Liang,Gong Jian,Xu Xuan.Identification of application-level protocols using characteristic[J].Computer Engineering and Applications,2006,42(24):16-19.(in Chinese)
[10] Postel J.RFC 793—transmission control protocol[EB/OL].(1981-09)[2004-03-13].http://www.faqs.org/rfcs/rfc793.html.
[11] 叶慈南,曹伟丽.应用数理统计[M].北京:机械工业出版社,2004.

相似文献/References:

[1]徐伟,杨怡,董永强,等.利用P2P技术实现移动终端在WLAN内的漫游认证[J].东南大学学报(自然科学版),2009,39(5):909.[doi:10.3969/j.issn.1001-0505.2009.05.008]
 Xu Wei,Yang Yi,Dong Yongqiang,et al.Station roaming authentication solution in WLAN based on P2P[J].Journal of Southeast University (Natural Science Edition),2009,39(3):909.[doi:10.3969/j.issn.1001-0505.2009.05.008]

备注/Memo

备注/Memo:
作者简介: 陈亮(1981—),男,博士生; 龚俭(联系人),男,博士,教授,博士生导师,jgong@njnet.edu.cn.
基金项目: 国家重点基础研究发展计划(973计划)资助项目(2003CB314804)、教育部科学技术重点研究资助项目(105084)、江苏省网络与信息安全重点实验室资助项目(BM2003201).
引文格式: 陈亮,龚俭.大规模网络中BitTorrent流行为分析[J].东南大学学报:自然科学版,2008,38(3):390-395.
更新日期/Last Update: 2008-05-20