A model approach to estimate Peer-to-Peer traffic matrices

Ke Xu*, Meng Shen, Mingjiang Ye

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

11 Citations (Scopus)

Abstract

Peer-to-Peer (P2P) applications have become increasingly popular in recent few years, which bring new challenges to network management and traffic engineering (TE). As basic input information, P2P traffic matrices are of significant importance for TE. Due to excessively high cost of direct measurement, a lot of studies aim at modeling and estimating general traffic matrices, but few focus on P2P traffic matrices. In this paper, we proposed a model to estimate P2P traffic matrices in networks. Important factors are considered, including the number of peers, the localization ratio of P2P traffic, and the distances among different networks. Here distance can be hop counts or geographic distance accordingly. To validate our model, we have evaluated the performance using both real P2P live steaming traces and file sharing application traces. Evaluation results show that the proposed model outperforms the other two typical models for general traffic matrices estimation, in terms of estimate errors. To the best of our knowledge, this is the first research on P2P traffic matrices estimation. P2P traffic matrices, derived from the model, can be applied to P2P traffic optimization and other TE fields.

Original languageEnglish
Title of host publication2011 Proceedings IEEE INFOCOM
Pages676-684
Number of pages9
DOIs
Publication statusPublished - 2011
Externally publishedYes
EventIEEE INFOCOM 2011 - Shanghai, China
Duration: 10 Apr 201115 Apr 2011

Publication series

NameProceedings - IEEE INFOCOM
ISSN (Print)0743-166X

Conference

ConferenceIEEE INFOCOM 2011
Country/TerritoryChina
CityShanghai
Period10/04/1115/04/11

Keywords

  • Peer-to-Peer (P2P)
  • Traffic engineering
  • Traffic matrix

Fingerprint

Dive into the research topics of 'A model approach to estimate Peer-to-Peer traffic matrices'. Together they form a unique fingerprint.

Cite this