att_abstract={{There is considerable interest in peer-to-peer (P2P) traffic because of  its remarkable increase over the last few years. By analyzing flow  measurements at the regional aggregation points of several cable  operators, we are able to study its properties. P2P has become a large  part of broadband traffic and its characteristics are different from older  applications, such as the Web. It is a stable balanced traffic: the peak  to valley ratio during a day is around two and the IN/OUT traffic balance  is close to one. Although P2P protocols are based on a distributed  architecture, they don't show strong signs of geographical locality. A  cable subscriber is not much more likely to download a file from a close  region than from a far region. It is clear that most of the traffic is  generated by heavy hitters who abuse P2P (and other) applications, whereas  most of the subscribers only use their broadband connections to browse the  web, exchange emails or chat. However it is not easy to directly block or  limit P2P traffic, because these applications adapt themselves to their  environment: the users develop ways of eluding the traffic blocks. The  traffic that could historically be identified with five port numbers is  now spread over thousands of TCP ports, pushing port based identification  to its limits. More complex methods to identify P2P traffic are not a  long-term solution, the cable industry should opt for a ?pay for what you  use? model like the other utilities. }},
	att_authors={ag1971, 0869737, ss2864, jh2974, hn1314},
	att_copyright_notice={{� 2003 AT&T Corp. All rights reserved.}},
	att_tags={P2P, Cable, Application},
	author={Alexander Gerber and Matthew Roughan and Subhabrata Sen and Joseph Houle and Han Nguyen},
	institution={{National Cable & Telecommunications Association (NCTA) National Show}},
	title={{P2P, the gorilla in the cable}},