Confronting P2P

3
Trend Analysis May 31, 2007 by David Vorhaus, Research Associate , [email protected], 617-880-0363 Confronting the Albatross of P2P Yankee Group published this content for the sole use of Yankee Group subscribers. It may not be duplicated, reproduced or retransmitted in whole or in part without the express permission of Yankee Group, 31 St. James Ave., Boston, MA 02116. Phone: (617) 956-5000. Fax: (617) 956-5005. E-mail: [email protected]. All rights reserved. All opinions and estimates herein constitute our judgment as of this date and are subject to change without notice. The Bottom Line: Accounting for approximately 60% of all internet bandwidth usage, peer-to-peer traffic is a massive hurdle for service providers. However, P2P also provides an emerging business model for traffic control and distribution. Key Concepts: P2P, peer-to-peer, content distribution, policy management, network traffic growth, IP video Who Should Read: Product development, business development or product marketing executive at a telecom equipment manufacturer; network management executive in charge of investing in service or policy control solutions Practice Leader: Philip Marshall, Ph.D. , Enabling Technologies Service Provider—Vice President, [email protected] , 617-880-0260 The Continuing Prevalence of P2P Traffic Using peer-to-peer (P2P) methods of content storage or file sharing is certainly not a new phenomenon. Dating back to the late 1990s and the glory days of Napster, P2P has alternatively served as a blessing for greedy consumers, a scourge for possessive content owners and a bandwidth weight hanging around the necks of network operators. Yet with the fall of P2P clients and applications such as Kazaa and eDonkey, and the neutering of Napster, some of the fervor surrounding illegal file sharing over P2P and the necessity to stop it has been quieted. The question now is: How much does P2P still matter as a technology, to both content owners and network operators? The answer: It matters a great deal. The role of P2P in dictating and influencing the flow of internet traffic over public networks today is staggering. Although it has dipped from its high point of approximately 70% a few years ago, Yankee Group estimates that P2P traffic still constitutes approximately 60% of all traffic that traverses the public internet. Moreover, as the leading P2P protocol, BitTorrent alone accounts for roughly 40% o f all bandwidth. Even more startling is the source of this traffic. The top 5% of users account for roughly 50% of all downstream traffic, indicating that it is these few “bandwidth hogs” that are pushing the limits of network capacity through massive P2P file transfers. What Is the Effect of P2P and How Is It Changing? Having established the tremendous burden that a relatively modest number of P2P users place on public networks, the question becomes: How does this traffic volume affect service providers, content owners and equipment vendors? There are a number of consequences of the role of P2P traffic, both harmful and beneficial, which are critical to understanding and controlling operators’ networks and content distribution. Demand Exceeds Supply Without the availability of unlimited bandwidth, network demand will far outpace network resources in the coming years. Unless carriers are willing to endlessly increase capacity on their networks—a strategy that would be both incredibly costly and inefficient—there is a finite amount of bandwidth available to subscribers. In times of peak usage, bandwidth-hogging users sharing large files over P2P can push networks to their absolute limit. In such a situation, users of latency-sensiti ve applications such as VoIP, streaming video or gaming may experience network lag and poor quality of experience.

Transcript of Confronting P2P

Page 1: Confronting P2P

8/14/2019 Confronting P2P

http://slidepdf.com/reader/full/confronting-p2p 1/3

Trend Analysis May 31, 2007 

by David Vorhaus, Research Associate , [email protected], 617-880-0363

Confronting the Albatross ofP2P 

Yankee Group published this content for the sole use of Yankee Group subscribers. It may not be duplicated, reproduced or retransmitted in whole or in part without the expresspermission of Yankee Group, 31 St. James Ave., Boston, MA 02116. Phone: (617) 956-5000. Fax: (617) 956-5005. E-mail: [email protected]. All rights reserved.

All opinions and estimates herein constitute our judgment as of this date and are subject to change without notice.

The Bottom Line: Accounting for approximately 60% of all internet bandwidth usage, peer-to-peer traffic is a massive hurdle for service providers. However, P2P also provides an emerging business model for traffic control and distribution.

Key Concepts: P2P, peer-to-peer, content distribution, policy management, network traffic growth, IP video

Who Should Read: Product development, business development or product marketing executive at a telecom equipmentmanufacturer; network management executive in charge of investing in service or policy control solutions

Practice Leader: Philip Marshall, Ph.D., Enabling Technologies Service Provider—Vice President, [email protected], 617-880-0260

The Continuing Prevalence of P2P Traffic

Using peer-to-peer (P2P) methods of content storage or file sharing is certainly not a new phenomenon. Dating back to the late1990s and the glory days of Napster, P2P has alternatively served as a blessing for greedy consumers, a scourge for possessivecontent owners and a bandwidth weight hanging around the necks of network operators. Yet with the fall of P2P clients andapplications such as Kazaa and eDonkey, and the neutering of Napster, some of the fervor surrounding illegal file sharing overP2P and the necessity to stop it has been quieted. The question now is: How much does P2P still matter as a technology, to bothcontent owners and network operators?

The answer: It matters a great deal. The role of P2P in dictating and influencing the flow of internet traffic over public networkstoday is staggering. Although it has dipped from its high point of approximately 70% a few years ago, Yankee Group estimatesthat P2P traffic still constitutes approximately 60% of all traffic that traverses the public internet. Moreover, as the leading P2Pprotocol, BitTorrent alone accounts for roughly 40% of all bandwidth.

Even more startling is the source of this traffic. The top 5% of users account for roughly 50% of all downstream traffic, indicatingthat it is these few “bandwidth hogs” that are pushing the limits of network capacity through massive P2P file transfers.

What Is the Effect of P2P and How Is It Changing?

Having established the tremendous burden that a relatively modest number of P2P users place on public networks, the questionbecomes: How does this traffic volume affect service providers, content owners and equipment vendors? There are a number of consequences of the role of P2P traffic, both harmful and beneficial, which are critical to understanding and controllingoperators’ networks and content distribution.

Demand Exceeds Supply

Without the availability of unlimited bandwidth, network demand will far outpace network resources in the coming years.Unless carriers are willing to endlessly increase capacity on their networks—a strategy that would be both incredibly costly andinefficient—there is a finite amount of bandwidth available to subscribers. In times of peak usage, bandwidth-hogging userssharing large files over P2P can push networks to their absolute limit. In such a situation, users of latency-sensitive applications

such as VoIP, streaming video or gaming may experience network lag and poor quality of experience.

Page 2: Confronting P2P

8/14/2019 Confronting P2P

http://slidepdf.com/reader/full/confronting-p2p 2/3

Confronting the Albatross of P2P May 31, 2007

 

© Copyright 2007. Yankee Group Research, Inc. All rights reserved.  2

 

This problem is poised to worsen in the coming years. Factors such as increased worldwide broadband penetration and themigration of large file formats such as standard or high-definition video to IP will create a greater bandwidth crunch for network operators. Compared to HTML and voice and music traffic, video (and especially HD video) files consume a massive amount of bandwidth (see Exhibit 1). As content owners migrate more video content to IP networks, bandwidth demand will inevitablyskyrocket. Telecom statistical tracking firm TeleGeography predicts that public internet traffic will double its current level of approximately 2.5 million Mbps to 5.0 million Mbps by the end of 2010, and rise to more than 7.0 million Mbps by 2012.

Exhibit 1.

Approximate Size of Content Types

0.0

0.5

1.0

1.5

2.0

2.5

3.0

HD VideoStandardVideo

MusicVoiceE-Mail

Size of 1 Hour of Content(in GB)

 

Source: Yankee Group, 2007 

As Bandwidth Demands Increase, So Do Investments in Tools to Control P2P

As a result of this increasing demand on scarce bandwidth, the burden of P2P traffic is driving investment among serviceproviders and large equipment vendors in next-generation service control solutions. Technologies such as deep packetinspection (DPI) are seeing strong market growth as service providers look to solutions that can reliably identify P2P traffic andovercome port hopping or masking techniques designed to disguise traffic types (particularly in markets such as Asia-Pacific,where P2P traffic volume is of great concern).

This growing investment is already evident in the recent initial public offerings by DPI vendors Allot Communications andSandvine Incorporated, the new rounds of funding for competitive vendor Ellacoya Networks, the purchase of pure-play vendorP-Cube by Cisco, the announcement of new service control products with enhanced capabilities and scalability, and theincreasing partnerships between these standalone vendors and larger equipment manufacturers such as Alcatel-Lucent andJuniper. Moreover, by folding stateful inspection technologies such as DPI into broader policy management and enforcementsolutions, vendors can equip service providers with QoS controls to prioritize latency-sensitive traffic at times of peak usage andtherefore maintain a high quality of experience for subscribers.

The Role of P2P in Video DistributionAlthough video will comprise a greater percentage of internet traffic in the coming years, it is inaccurate to characterize this contentas something wholly separate from P2P traffic, as some observers are prone to do. Rather, P2P has a role to play in video storageand distribution for both economic and capacity reasons. Therefore, P2P can aid operators rather than become a traffic burden. P2Ptechnology is better equipped to handle large file formats such as video than alternatives such as a content distribution network (CDN). As network operators look to counter the increasing traffic flows that video will create, locally caching content anddistributing it in a peering model is an attractive method of controlling the problem. The sheer volume of video traffic on thehorizon behooves content owners and service providers to entertain P2P technology as a viable distribution mechanism.

Page 3: Confronting P2P

8/14/2019 Confronting P2P

http://slidepdf.com/reader/full/confronting-p2p 3/3

Confronting the Albatross of P2P May 31, 2007

 

© Copyright 2007. Yankee Group Research, Inc. All rights reserved.  3

 

P2P Goes Legit

P2P is gaining a measure of legitimacy, which supports the business case for using the technology as a distribution mechanism.Moving beyond the dark days of illegal file distribution in a peering model, P2P solutions from companies such as BitTorrent,Solid State Networks and Red Swoosh (part of Akamai) are marketing themselves directly to content owners as a more efficientand cost-effective way to disseminate content. Additionally, hybrid P2P-CDN solutions such as those offered by Joost,CacheLogic and Oversi appeal to service providers by calling out the ways that P2P caching can alleviate the concerns broughtby increased traffic flow.

As more content owners and service providers look to these solutions and P2P technology distances itself from the stigmabrought on it in previous years by the media and the courts, “legitimate” P2P could surpass its illegitimate cousin in terms of traffic volume.

The Dichotomy of P2P

The upshot of these outcomes is that P2P provides both a troublesome traffic burden and an emerging business opportunity forboth content owners and service providers as network resources grow scarcer. P2P will continue to constitute nearly two-thirdsof traffic on the public internet in the coming years. Its role in video distribution will be magnified as content owners respond toconsumer demands to have their content available anywhere by migrating an increasing amount of video to IP. This will in turnspur greater investment in policy management and control solutions that are designed (in part) to mitigate the burden of P2Ptraffic. Yankee Group forecasts the market for policy management to reach $718 million by 2010.

Yet P2P technology has the potential to help alleviate many of the same concerns that it creates. P2P is likely to grow as analternative distribution mechanism that can handle large file formats and locally cache massive amounts of content in a peeringmodel to relieve traffic pressure on the network backbone. As this occurs and the legitimacy of the technology becomes moreestablished, both service providers and content owners will rely on P2P to distribute and store content in a more efficient andcost-effective manner.

Recommendations

•  P2P caching solutions must achieve carrier-grade reliability and scalability. Traffic over the IP backbone of the largestservice provider networks can exceed 6 petabytes on a daily basis. To make a significant dent in controlling this level of traffic, particularly as it grows, P2P caching vendors must increase the scalability of their products, as well as provide ameasure of reliability that meets the comfort level required by service providers. Distributing video for a major contentprovider such as HBO or ESPN is all well and good, but it is not the same as managing the P2P traffic for a service provider

such as AT&T or BT.

•  Larger vendors should have targeted solutions that address P2P management. Service providers are aware of the roleof P2P traffic in the coming years, and they are undoubtedly concerned about it. As one major North American operatordescribed the situation, while P2P traffic is currently huge in the network, it is just touching on the growth potential. Oncecompanies such as Blockbuster and Netflix place all of their content online, the operator expects P2P traffic volume toescalate quickly and become a significant problem. Tier 1 vendors must directly address these concerns by marketingsolutions that specifically control P2P traffic. Examples of these sorts of targeted solutions include embedded DPItechnology, partnerships with pure-play DPI or policy management vendors, enhanced network management capabilitieswithin existing elements, or localizing P2P traffic through caching solutions.