DocumentCode :
2576922
Title :
Analysis of BT network based on active measurement
Author :
Li, Linqing ; Su, Dongliang ; Wang, Zhihao ; Yang, Zhe
Author_Institution :
Provincial Key Lab. for Comput. Inf. Process. Technol., Soochow Univ., Suzhou, China
Volume :
2
fYear :
2010
fDate :
30-31 May 2010
Firstpage :
379
Lastpage :
383
Abstract :
Peer-to-peer (P2P) systems enable a wide range of important, scalable and reliable services such as file sharing, voice-over-IP (VoIP) and video streaming. And they also generate most traffic in all regions. Excessive P2P traffic can cause significant network management problems because these systems are notoriously greedy with regard to bandwidth consumption. As a result, the ISPs and all network administrators have a mutual interest in shaping, blocking or otherwise limiting P2P traffic. Before doing these, understanding, analyzing and identifying P2P traffic is necessary. In this paper, we inside analyze BitTorrent (BT) traffic with a special modified Vuze client in a stub network. Preliminary results indicate that among all forty-nine BT clients we have detected, the most popular two are μTorrent and Azureus. They have over 50%-86% market share. And about one-third of all clients are the legacy or proprietary client, which have no capacity of supporting the Message Stream Encryption (MSE) protocol. Further, the BT clients relied excessively on trackers, because near half peers´ information come from trackers, especially in the beginning of new mission. Moreover, Distributed Hash Table (DHT) did not play the proper role as it is expected. Finally, we unexpectedly find that the most popular used port is still 6881, but it is only 2.24%.
Keywords :
computer network management; computer network security; cryptographic protocols; peer-to-peer computing; telecommunication traffic; μTorrent; Azureus; BT network; BitTorrent; ISP; P2P traffic; Vuze client; active measurement; distributed hash table; message stream encryption protocol; network administrator; network management problem; peer-to-peer system; stub network; Bandwidth; Computer networks; Cryptography; Information analysis; Internet telephony; Laboratories; Peer to peer computing; Protocols; Streaming media; Telecommunication traffic; Dumb client; Peer-to-peer; Traffic analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Networking and Digital Society (ICNDS), 2010 2nd International Conference on
Conference_Location :
Wenzhou
Print_ISBN :
978-1-4244-5162-3
Type :
conf
DOI :
10.1109/ICNDS.2010.5479460
Filename :
5479460
Link To Document :
بازگشت