understanding skype signaling · uncorrected proof 64 knowledge, this work is the first...

11
UNCORRECTED PROOF 1 2 Understanding Skype signaling 3 Dario Rossi a, * , Marco Mellia b , Michela Meo b 4 a TELECOM ParisTech, INFRES, 37/39 Rue Dareau, 75014 Paris, France 5 b Politecnico di Torino, Italy 6 8 article info 9 Article history: 10 Available online xxxx 11 12 Keywords: 13 Internet traffic measurements 14 Skype 15 16 abstract 17 Skype is without a doubt today’s VoIP application of choice. Its amazing success has drawn 18 the attention of both telecom operators and the research community. There is a great inter- 19 est in characterizing Skype’s traffic, understanding its internal mechanisms, and learning 20 about its users’ behavior. One of the most interesting characteristics of Skype is that it 21 relies on a P2P infrastructure for the exchange of signaling information that is distributed 22 between peers. 23 Leveraging the use of an accurate Skype classification engine that we recently designed, 24 we now report the results of our experimental study of Skype signaling based on extensive 25 passive measurements collected from our campus LAN. We avoid the need to reverse-engi- 26 neer the Skype protocol, and we instead adopt a black-box approach. We focus on signaling 27 traffic in order to infer certain interesting properties regarding overlay maintenance and, 28 possibly, the overlay structure as well. 29 Our results show that, even though the signaling bandwidth used by normal peers is 30 exiguous, it may nonetheless account for a significant portion of the total traffic generated 31 by a single Skype client. Skype performs peer discovery and refresh by using a large num- 32 ber of single packet probes. This may be as effective for the purpose of overlay maintenance 33 as it is costly, at least from the viewpoint of layer-4 network devices. At the same time, sin- 34 gle-packet probes account for only a minor fraction of all signaling traffic: therefore, we 35 wish to explore more deeply the traffic that is exchanged among the more stable peers, 36 in an attempt to learn how the peer selection mechanism actually operates. 37 Measurements were collected during April and August 2007. In particular, during the 38 second month of sampling, the Skype network suffered a worldwide service outage. We 39 compare the results collected during the two time periods, and we demonstrate the strik- 40 ing impacts on the signaling network as a result of the outage. 41 Ó 2008 Published by Elsevier B.V. 42 43 44 1. Introduction 45 In the last few years, VoIP telephony has gained tremen- 46 dous popularity, with an increasing number of operators 47 offering VoIP-based phone services. Skype [1] is the most 48 remarkable example of this new phenomenon: developed 49 in 2002 by the creators of KaZaa, it recently reached over 50 170 million users, and it accounts for more than 4.4% of to- 51 tal VoIP traffic [2]. As the most popular and successful VoIP 52 application, Skype has attracted the attention of the re- 53 search community and of multiple telecom operators as 54 well. 55 One of the most interesting features of Skype is that it 56 relies on a P2P infrastructure to exchange signaling infor- 57 mation in a distributed fashion, with a twofold benefit of 58 making the system both highly scalable and robust. The 59 natural question is as follows: how costly is the P2P over- 60 lay maintenance, and how great is the signaling overhead 61 needed to exchange information about users’ reachability 62 in a distributed fashion? The objective of this paper is to 63 provide answers to these questions. To the best of our 1389-1286/$ - see front matter Ó 2008 Published by Elsevier B.V. doi:10.1016/j.comnet.2008.10.013 * Corresponding author. Tel.: +33 145817563. E-mail address: [email protected] (D. Rossi). Computer Networks xxx (2008) xxx–xxx Contents lists available at ScienceDirect Computer Networks journal homepage: www.elsevier.com/locate/comnet COMPNW 3891 No. of Pages 11, Model 3G 8 November 2008 Disk Used ARTICLE IN PRESS Please cite this article in press as: D. Rossi et al., Understanding Skype signaling, Comput.Netw. (2008), doi:10.1016/ j.comnet.2008.10.013

Upload: others

Post on 09-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Understanding Skype signaling · UNCORRECTED PROOF 64 knowledge, this work is the first investigation of Skype sig- 65 naling traffic:indeed, the study of Skype is madevery com-

1

2

3

45

6

8

91011

12131415

1 6

43

44

45

46

47

48

49

50

51

Computer Networks xxx (2008) xxx–xxx

COMPNW 3891 No. of Pages 11, Model 3G

8 November 2008 Disk UsedARTICLE IN PRESS

Contents lists available at ScienceDirect

Computer Networks

journal homepage: www.elsevier .com/ locate/comnet

OFUnderstanding Skype signaling

Dario Rossi a,*, Marco Mellia b, Michela Meo b

a TELECOM ParisTech, INFRES, 37/39 Rue Dareau, 75014 Paris, Franceb Politecnico di Torino, Italy

a r t i c l e i n f o a b s t r a c t

1718192021222324

Article history:Available online xxxx

Keywords:Internet traffic measurementsSkype

2526272829303132333435363738394041

1389-1286/$ - see front matter � 2008 Published bdoi:10.1016/j.comnet.2008.10.013

* Corresponding author. Tel.: +33 145817563.E-mail address: [email protected] (D. Rossi).

Please cite this article in press as: D. Rj.comnet.2008.10.013

REC

TED

PR

O

Skype is without a doubt today’s VoIP application of choice. Its amazing success has drawnthe attention of both telecom operators and the research community. There is a great inter-est in characterizing Skype’s traffic, understanding its internal mechanisms, and learningabout its users’ behavior. One of the most interesting characteristics of Skype is that itrelies on a P2P infrastructure for the exchange of signaling information that is distributedbetween peers.

Leveraging the use of an accurate Skype classification engine that we recently designed,we now report the results of our experimental study of Skype signaling based on extensivepassive measurements collected from our campus LAN. We avoid the need to reverse-engi-neer the Skype protocol, and we instead adopt a black-box approach. We focus on signalingtraffic in order to infer certain interesting properties regarding overlay maintenance and,possibly, the overlay structure as well.

Our results show that, even though the signaling bandwidth used by normal peers isexiguous, it may nonetheless account for a significant portion of the total traffic generatedby a single Skype client. Skype performs peer discovery and refresh by using a large num-ber of single packet probes. This may be as effective for the purpose of overlay maintenanceas it is costly, at least from the viewpoint of layer-4 network devices. At the same time, sin-gle-packet probes account for only a minor fraction of all signaling traffic: therefore, wewish to explore more deeply the traffic that is exchanged among the more stable peers,in an attempt to learn how the peer selection mechanism actually operates.

Measurements were collected during April and August 2007. In particular, during thesecond month of sampling, the Skype network suffered a worldwide service outage. Wecompare the results collected during the two time periods, and we demonstrate the strik-ing impacts on the signaling network as a result of the outage.

� 2008 Published by Elsevier B.V.

R 42

52

53

54

55

56

57

58

59

60

UN

CO1. Introduction

In the last few years, VoIP telephony has gained tremen-dous popularity, with an increasing number of operatorsoffering VoIP-based phone services. Skype [1] is the mostremarkable example of this new phenomenon: developedin 2002 by the creators of KaZaa, it recently reached over170 million users, and it accounts for more than 4.4% of to-tal VoIP traffic [2]. As the most popular and successful VoIP

61

62

63

y Elsevier B.V.

ossi et al., Understand

application, Skype has attracted the attention of the re-search community and of multiple telecom operators aswell.

One of the most interesting features of Skype is that itrelies on a P2P infrastructure to exchange signaling infor-mation in a distributed fashion, with a twofold benefit ofmaking the system both highly scalable and robust. Thenatural question is as follows: how costly is the P2P over-lay maintenance, and how great is the signaling overheadneeded to exchange information about users’ reachabilityin a distributed fashion? The objective of this paper is toprovide answers to these questions. To the best of our

ing Skype signaling, Comput.Netw. (2008), doi:10.1016/

Page 2: Understanding Skype signaling · UNCORRECTED PROOF 64 knowledge, this work is the first investigation of Skype sig- 65 naling traffic:indeed, the study of Skype is madevery com-

E

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

2 D. Rossi et al. / Computer Networks xxx (2008) xxx–xxx

COMPNW 3891 No. of Pages 11, Model 3G

8 November 2008 Disk UsedARTICLE IN PRESS

OR

R

knowledge, this work is the first investigation of Skype sig-naling traffic: indeed, the study of Skype is made very com-plex by the fact that protocols are proprietary, that thesystem makes extensive use of cryptography, obfuscationand anti reverse-engineering techniques [4], and that ituses a number of techniques to circumvent NAT and fire-wall limitations [3].

By building on our previous work in which we devised amethodology that successfully tackles the problem of Sky-pe traffic identification [8], we aim to contribute to theunderstanding of Skype’s operation. We follow an identicalmethodology to that in our previous research, which relieson protocol ignorance. This is because Skype’s proprietarydesign and its adoption of cryptography mechanismsmakes it almost impossible to decode. Consequently, wedid not perform any reverse engineering of the protocol.We propose a simple classification of Skype signaling traf-fic, isolating different components of signaling activity thatpertain to different tasks (such as network discovery, con-tact list refresh and overlay maintenance). Our resultsshow that, despite the fact that the signaling bandwidthused by normal peers is exiguous, it may nonetheless con-stitute a very significant portion of the total traffic gener-ated by a Skype client. Also, we observe that Skypeperforms peer discovery and refresh using a large numberof single packet probes. At the same time, the bulk of thesignaling traffic is carried by a relatively small number oflonger flows, exchanged with more stable contacts. Wetherefore explored the traffic exchanged among suchpeers, in an attempt to understand how the peer selectionmechanism works: in the following, we will show that theselection is driven by both network latency and userpreferences.

Our study uses measurements collected during Apriland August 2007. During the second month of sampling,the Skype network suffered a worldwide service outagethat lasted two days. We compare the results collectedduring the two time periods, and we report on the strikingimpacts on the signaling network as a result of the outage.

Despite the attention of the research community andtelecom operators, [3–9], all previous papers but [3] havecompletely ignored Skype signaling traffic. [3] focuses onthe login phase, and on how Skype traverses NAT and fire-walls. By contrast, our aim is to provide quantitative in-sights into the volume and characterization of Skypesignaling traffic. Moreover, we evaluate the cost of typicalP2P mechanisms, such as network discovery, overlaymaintenance, and information diffusion.

167

168

169

170

171

172

173

174

175

176

177

178

UN

C

2. Skype Overview

In this section, we overview Skype behavior.Skype offers end users several (free) services: (i) voice

communication, (ii) video communication, (iii) file transferand (iv) chat services. Communication between users isestablished using a traditional end-to-end IP paradigm,but Skype can also route calls through a SuperNode to easethe traversal of symmetric NATs and firewalls. Voice callscan also be directed toward the PSTN using Skypein/Skype-out services, in which case a fee is applied.

Please cite this article in press as: D. Rossi et al., Understandj.comnet.2008.10.013

CTED

PR

OO

F

The main difference between most VoIP services andSkype is that the latter operates on a P2P model, exceptfor user authentication, which is performed under a clas-sical client–server architecture by means of public keymechanisms. After the user (and the client) has beenauthenticated, all further signaling is performed on theP2P network, so that Skype’s user information (e.g., con-tact lists, status, and preferences) is entirely decentral-ized and distributed among nodes. This allows theservice to scale very readily, thereby avoiding a central-ized (and expensive) infrastructure. Peers in the P2Parchitecture can be either normal nodes or SuperNodes.The latter are selected among peers with large computa-tional power and good connectivity (considering band-width, uptime and absence of firewalls). They take partin a decentralized information distribution system thatis based on a DHT.

From a protocol perspective, Skype uses a proprietarysolution that is difficult to reverse engineer due to itsextensive use of both cryptography and obfuscation tech-niques [4,3]. Though Skype may rely on either TCP orUDP at the transport layer, both signaling and communica-tion data are preferentially carried over UDP. A single ran-dom port is selected during application installation, and itis never changed (unless forced by the user). When a UDPcommunication is impossible, Skype reverts to TCP, listen-ing to the same random port, and to ports 80 and 443,which are normally left open by network administratorsto allow Web browsing. We introduce the followingdefinitions:

� A Skype client is identified by the endpoint address, i.e.,the (IP address, UDP/TCP port) pair.

� A Skype flow is the bidirectional set of packets havingthe same tuple (IP source and destination addresses,UDP/TCP source and destination ports, IP protocol type).A flow starts when a packet with a given flow tuple isfirst observed, and it is ended by either an inactivitytimeout (set to 200s as later discussed) or, in case ofTCP, by observing the tear-down sequence, if present.We further refer to the sender and receiver unidirectionalflows to distinguish among the stream of packets com-ing from the same source and going to the samedestination.

3. Measurement results

We report results that were collected by passively mon-itoring the campus access link at Politecnico di Torino formore than a month, starting from 22 April 2007.

Our methodology is as follows. Through the use of theclassification framework [8], we were able to reliably iden-tify individual voice/video calls initiated by Skype peers. Aspreviously explained, all Skype communication events aremultiplexed over the same transport layer port, so that apair (IP,port) uniquely identifies a Skype peer. Since wemonitored the campus network continuously, we were ableto build a list of Skype peers that actively placed voice/vi-deo calls in our network. By using such a list, we obtained a

ing Skype signaling, Comput.Netw. (2008), doi:10.1016/

Page 3: Understanding Skype signaling · UNCORRECTED PROOF 64 knowledge, this work is the first investigation of Skype sig- 65 naling traffic:indeed, the study of Skype is madevery com-

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

D. Rossi et al. / Computer Networks xxx (2008) xxx–xxx 3

COMPNW 3891 No. of Pages 11, Model 3G

8 November 2008 Disk UsedARTICLE IN PRESS

subset of the traffic that originated from (or was transmit-ted to) the various Skype endpoints. Moreover, by means of[8] we were able to reliably filter out from the subset anyvoice/video calls, thereby allowing us to focus exclusivelyon the analysis of Skype signaling traffic.

During our measurement period, we observed about1700 distinct internal Skype clients, out of the more than7000 different hosts used by both students and staff mem-bers (in total, this comprised about 50,000 people). Wepresent a subset of those results, namely, the first weekduring which we monitored Skype peers’ activities, duringwhich internal Skype clients contacted nearly 305,000external peers, exchanging about 2.5 million flows for a to-tal of 33 million packets.

Fig. 1 shows the changes during the week-long observa-tion period in number of clients, flows, packets and bytes(from top to bottom, respectively) observed during 5-mintime windows. Given the number of active clients (topplot), we observed a typical day–night periodicity duringweekdays. A minimum of about 80 Skype clients were ac-tive at any given time, with a maximum of 260 duringweekdays, and 120 during weekends. A similar periodicitywas present in the number of flows, packets and bytes.However, the latter showed higher burstiness.

UN

CO

RR

E5M3M1M 1M3M5M

Sun 22nd Mon 23rd Tue 24th Wed 25th T

Byt

es

40k20k

020k40k

Pack

ets

10k5k 05k

10k

Flow

s

0 100 200 300

Clie

nts

Fig. 1. Number of active clients, flows, packets and bytes o

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

1 10 100 1000 10000

CD

F

Average signaling bitrate [bps]

Fig. 2. Signaling bitrate (left) and number o

Please cite this article in press as: D. Rossi et al., Understandj.comnet.2008.10.013

RO

OF

3.1. Signaling overhead

We note that the average signaling bitrate, i.e., the totalnumber of signaling bits transmitted by a client over itswhole lifetime, was very low. The left plot of Fig. 2 illus-trates the Cumulative Distribution Function (CDF) of theaverage signaling bitrate. It is clear that the required sig-naling bandwidth is less than 100 bps in 95% of cases,while only very few nodes generate more than 1 kbps(these may have been SuperNodes).

Since the signaling bitrate is exiguous, its relativeimportance vanishes if weighted on the grounds of VoIPcall traffic. For about 5% of the Skype clients, signaling ac-counted for only 5% of the total traffic (i.e., including voiceand video calls). At the same time, since clients were leftrunning for long periods without VoIP services being ac-tive, the signaling traffic dominated communication in80% of all cases, accounting for more than 99% of the trafficgenerated by an average Skype client.

Let C(p,i) be the number of different peers contacted bypeer p considering the ith time interval since the start ofpeer activity, where time intervals are 5 min long. Distri-bution of C(p,i) over all internal peers, and over all mea-surement intervals, is shown in the right-hand plot of

CTED

P

hu 26th Fri 27th Sat 28th Sun 29th

bserved every 5 min during the measurement week.

0

0.25

0.5

0.75

1

0 25 50 75 100

CD

F

C(p,i)

f contacted peers per unit time(right).

ing Skype signaling, Comput.Netw. (2008), doi:10.1016/

Page 4: Understanding Skype signaling · UNCORRECTED PROOF 64 knowledge, this work is the first investigation of Skype sig- 65 naling traffic:indeed, the study of Skype is madevery com-

EED

PR

OO

F226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

278

279

10-6

10-5

10-4

10-3

10-2

10-1

1

1 10 102 103 104 105 106

1-C

DF

Flow length [Packets]

10-6

10-5

10-4

10-3

10-2

10-1

1

10-2 10-1 1 10 102 103 104

1-C

DF

Flow duration [sec]

Fig. 3. Complementary distributions of the signaling flow volume (left) and duration (right).

-2500-2000-1500-1000

-5000

500 1000 1500 2000 2500

0 12 24 36 48 60 72 84

Time elapsed [Hr]Start: Mon May 29, 10h02

Peer A

0 4 8 12 16 20 24

Time elapsed [Hr]Start: Tue May 30, 07h59

Peer B

0 1 2 3 4 5 6 Incr

emen

tal I

dent

ifie

rs I

D- a

nd I

D+

Time elapsed [Hr]Start: Wed May 31, 10h21

Peer C

Fig. 4. Skype signaling activity: contacted peers over time.

4 D. Rossi et al. / Computer Networks xxx (2008) xxx–xxx

COMPNW 3891 No. of Pages 11, Model 3G

8 November 2008 Disk UsedARTICLE IN PRESS

UN

CO

RR

Fig. 2. Every 5 min, a peer exchanges data on average with16 other peers, and no more than 30 other peers are con-tacted in 90% of cases. Still, C(p,i) can grow larger than 75in 1% of the cases, which may constitute a burden for cer-tain layer-4 devices that maintain flow states (e.g., a entryin a NAT table, a lookup in a firewall ACL table). We willshow that many signaling flows are single-packet probesthat create new temporary soft-state entries, many ofwhich are rarely used thereafter.

3.2. Signaling flow classification

We wish to observe the signaling traffic that a Skype cli-ent exchanges. In particular, we examined measurementsat the transport (flow) layer. The semantic of the signalingactivity cannot be inferred from purely passive measure-ments, but the form of signaling activity can be differenti-ated. Let us consider the source signaling flow length (inpackets) and the duration (in seconds) as a complementarydistribution function (1-CDF) shown in Fig. 3 on a log–logscale. About 80% of the signaling flows consist of singlepacket probes, and 99% of the flows are shorter than 6packets. At the same time, some persistent signaling activ-ity is present, transferring a few MBytes of informationover several thousand packets and lasting many hours.This is shown by the long tails in Fig. 3. Indeed, the sin-gle-packet flows account for less than 5% of all bytesexchanged.

Please cite this article in press as: D. Rossi et al., Understandj.comnet.2008.10.013

CTWe consider the schematic representation of typical

Skype signaling activity. Let p be the observed peer andIp(x,t) be an indicator function that takes the value 1 if peerx sends/receives a packet to/from peer p at time t. Ip(x,t)represents the P2P overlay topology evolution over timeas seen by peer p. Peers {x} will be identified by increasingnumbers of identifiers (IDs) consistent with their arrivalorder. N is the total number of peers observed during thelifetime of peer p. Positive IDs are used for packets thatwere sent from p, negative IDs for packets sent to p.

Fig. 4 reports Ip(x,t) considering three different peers,namely, the most active peer A that does not perform anyvoice calls during the observation period (left plot in thefigure), a random peer B that generates only signaling traf-fic (center plot), and a randomly chosen peer C that hasboth signaling and voice flows (right plot). The figureshows that A has contacted (was contacted by) about2500 other peers during its lifetime, whereas B and C(whose lifetimes are admittedly shorter) were contactedby about 1100 and 450 other peers respectively.

Three observations hold. First, the number of peers con-tacted exhibits an almost linear growth over time, suggest-ing that P2P network discovery was carried out duringmost of the peers’ lifetimes. This part of the signaling activ-ity is mainly carried out by transmission of a single packet,which (most of the time) is followed by some kind ofacknowledgment. The fact that p knows the IP addressand UDP/TCP port number of valid (but previously uncon-

ing Skype signaling, Comput.Netw. (2008), doi:10.1016/

Page 5: Understanding Skype signaling · UNCORRECTED PROOF 64 knowledge, this work is the first investigation of Skype sig- 65 naling traffic:indeed, the study of Skype is madevery com-

E

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

318

319

320

321

322

323

324

325

326

327

328

329

330

331

332

333

334

335

336

337

338

339

340

341

342

343

344

345

346

347

348

349

350

351

352

353

354

355

356

357

358

359

360

361

362

363

364

365

366

367

368

369

370

371

372

373

374

Table 1Per-source signaling traffic classification.

Level Probe% Heartbeat% Dialog% Mix% Total No.

Peers 51.2 15.8 25.1 8.0 390126Flows 8.0 26.3 6.2 59.5 2505622Packets 1.0 3.1 12.6 83.3 18274451

D. Rossi et al. / Computer Networks xxx (2008) xxx–xxx 5

COMPNW 3891 No. of Pages 11, Model 3G

8 November 2008 Disk UsedARTICLE IN PRESS

UN

CO

RR

tacted) Skype peers means that the above information isacquired by some signaling message. Since some of the un-known contacted peers may have gone offline before pactually probes them, the positive and negative ID rangesare not exactly symmetrical. Second, some of the peersare contacted on a regular basis: in the activity plot, hori-zontal elements indicate that the same peer is periodicallycontacted during the lifetime of p. Finally, periodic infor-mation refreshments can be distinguished in the form ofvertical patterns (clearly visible in the right-hand side ofFig. 4 about once an hour).

These observations suggest the existence of differenttypes of signaling flows, which we classify depending ontheir length and periodicity as:

� One-time probe: Any packet sent to an unknown peer, towhich a single reply packet possibly follows, but no fur-ther packet is exchanged between the peer pair. For thesake of brevity, hereafter we refer to one-time probessimply as probes.

� Heartbeat: A sequence of periodically exchanged one-time probes, separated by a time gap larger than the inac-tivity timeout, so that they are identified as differentflows.

� Dialog: Any flow constituted by more than one packet.

In Fig. 4, heartbeats and dialogs can be easily recognizedas dotted horizontal patterns and solid horizontal seg-ments, respectively. Periodic information refresh opera-tions, responsible for the vertical patterns, involve bothheartbeats toward peers that are already known and dis-covery probes that target new peers.

Notice that the above definitions are sensitive to the set-ting of the end-of-flow inactivity timer, e.g., by setting thetimeout to infinity, heartbeats will be classified as dialogs.However, we experimentally verified that the results areonly very marginally affected by the choice of inactivitytimer period, so long as it is smaller than a few minutes. Re-sults reported in this paper were all generated by setting thetimer to 200 s. This choice is justified by the fact that thelargest regular inter-packet-gap that we ever observedwas 180 s.

For the sake of simplicity, we distinguish signaling traf-fic depending on the kind of signaling activity in:

� Probe traffic, which is associated with probe flows;� Non-probe traffic, which is associated with heartbeats

and dialog flows.

3.3. Signaling flow characterization

We now analyze and characterize signaling traffic basedon the proposed flow classifications. We focus on internalpeers, and we investigate the resulting flows1. Table 1 sum-marizes the average amount of traffic due to external peersthat exchange with a single peer (i) only probe flows (la-

1 We restrict our attention to internal peers, since we do not have accessto all the traffic generated by external peers.

Please cite this article in press as: D. Rossi et al., Understandj.comnet.2008.10.013

CTED

PR

OO

F

beled as ‘probe’ in the table), (ii) only heartbeats, (iii) onlydialogs or (iv) a mix of heartbeat and dialog flows. Resultsare reported considering the number of peers, flows andpackets. Clients generate one-time probes with more than50% of contacted peers. But only 8% of all observed flowsare one-time probes, accounting for just 1% of signalingpackets. Subsequently, internal clients exchange heartbeatsalone with about 15.8% of their external contacts, which cor-responds to about 26% (3%) of the flows (packets). By con-trast, dialogs represent the only signaling activity for aquarter of all the peers (25.1%), accounting for a relativelymodest percentage of flows (6.2%), but corresponding to alarge number of packets (12.6%). Finally, a mixture of heart-beats and dialogs is exchanged with about 8% of all peers,which builds the bulk of the signaling activity in terms offlows (59.5%) and packets (83%).

Our results suggest that probe and non-probe trafficcorrespond to different kinds of signaling activity (possiblynetwork discovery and network maintenance). To furtherconfirm this intuition, the distribution of the UDP payloadsize reported in Fig. 5 shows that different information iscarried by probe and non-probe traffic. The figure showsthat probe traffic typically exhibits smaller packet sizethan non-probe traffic. Although it is not possible with apurely passive measurement technique and without re-verse engineering of the protocol to make statementsabout Skype signaling operations, it is possible to conjec-ture that: (i) network discovery, carried out by means ofprobes, is a continuous activity; (ii) heartbeats are usedto continuously ping contacts and friends, and to notifyothers of changes in their status; (iii) dialogs may be usedto maintain the overlay, during call setup, and to updateuser information, etc.

4. Further insights into Skype signaling

In this section, we gather further insights into Skypesignaling traffic, inferring some interesting properties ofthe Skype overlay network such as the churn rate, the geo-location of peers and their selection process, and the corre-lation of signaling traffic over time.

375

376

377

378

4.1. On the Skype churning rate

One of the parameters that affects P2P systems in gen-eral is the churn rate, i.e., the peer arrival and departureprocesses that force the P2P overlay to be updated. In orderto understand the churn process in the Skype network, weperformed a measurement of peer lifetime and deathtime.In particular, a peer is considered dead if no packet is sent

ing Skype signaling, Comput.Netw. (2008), doi:10.1016/

Page 6: Understanding Skype signaling · UNCORRECTED PROOF 64 knowledge, this work is the first investigation of Skype sig- 65 naling traffic:indeed, the study of Skype is madevery com-

EC

TED

PR

OO

F379

380

381

382

383

384

385

386

387

388

389

390

391

392

393

394

395

396

397

398

399

400

401

402

403

404

405

406

407

408

409

0

0.01

0.02

0.03

0.04

0.05

0.06

0.07

0.08

6 12 18 24

pdf

Time [h]

Peer Lifetime

0

0.01

0.02

0.03

0.04

0.05

0.06

0.07

0.08

6 12 18 24

pdf

Time [h]

Peer Deathtime

Fig. 6. Peer lifetime (left) and deathtime (right) pdf.

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

0 200 400 600 800 1000 1200 1400

CD

F

UDP Packet Payload [Bytes]

Non-ProbesProbe

0

0.1

0.2

0 100 200 300 400 500 600

pdf

Probes

0

0.1

0.2

pdf

Non-Probes

Fig. 5. Probe versus non-probe traffic packet size.

0

10

20

30

40

50

60

70

80

-150 -100 -50 0 50 100 150

Lat

itude

Longitude

TorinoParis

Fig. 7. Peer geolocation: graphical representation.

6 D. Rossi et al. / Computer Networks xxx (2008) xxx–xxx

COMPNW 3891 No. of Pages 11, Model 3G

8 November 2008 Disk UsedARTICLE IN PRESS

UN

CO

RR

for a period of time longer that an idle time s. Otherwise,the peer is considered alive. We experimentally verifiedthat any value of s larger that 200 s has a minimal impacton the lifetime measurements, and, therefore, we conser-vatively selected s = 500s. Fig. 6 shows the probability den-sity function (pdf) of peer lifetime (left plot) and deathtime(right plot). We note that peer lifetimes are either short(one or two hours) or much longer (7–10 h). About 95%of peers disappear after 10 h of activity. However, theremaining 5% of peers have a lifetime that is much longer,with more than 1% remaining alive during the whole week.In respect of peer deathtime, we observed that the deathperiod was either shorter than 2 h or longer than 11 h.The pdf also exhibits a heavier tail, indicating that about2% of peers remained idle for more than 72 h.

The intuition behind this is that the majority of individ-uals run Skype by default, so that peer lifetime matches PCoperation schedules; i.e., it is on during the day and offduring the night. Nonetheless, some PCs are left runningduring the night as well, so in these cases, the Skype life-time can be much longer. This confirms our intuition thatSkype’s churn rate is very low, which contributes to limit-ing the P2P overlay maintenance costs and update rates.

Please cite this article in press as: D. Rossi et al., Understandj.comnet.2008.10.013

4.2. On the geolocation of Skype peers

We now consider the geographical locations of Skypepeers. In our dataset, we observed 263,886 different IP ad-dresses. We queried the geographical locations of theabove addresses using HostIP [10], a public, open and freeIP address database.

The resulting geolocation is shown in Fig. 7, which de-picts the subset of about 10k peers (out of about 264k que-

ing Skype signaling, Comput.Netw. (2008), doi:10.1016/

Page 7: Understanding Skype signaling · UNCORRECTED PROOF 64 knowledge, this work is the first investigation of Skype sig- 65 naling traffic:indeed, the study of Skype is madevery com-

EC

TE

410

411

412

413

414

415

416

417

418

419

420

421

422

423

424

425

426

427

428

429

430

431

432

433

434

435

436

437

438

439

440

441

442

443

444

445

446

447

448

449

450

451

452

453

454

455

456

457

458

459

460

461

462

463

464

465

466

467

468

469

470

471

472

473

474

475

476

477

478

479

480

481

482

483

0 0.002 0.004 0.006 0.008 0.01

0.012

10 100 1000

pdf

Round Trip Time [ms]

Non-Probe

0 0.002 0.004 0.006 0.008 0.01

0.012

10 100 1000

pdf

Probe

Fig. 8. Probe versus non-probe traffic: round-trip times.

D. Rossi et al. / Computer Networks xxx (2008) xxx–xxx 7

COMPNW 3891 No. of Pages 11, Model 3G

8 November 2008 Disk UsedARTICLE IN PRESS

RR

ries), for which precise longitude and latitude informationwas available. From the graphic, one can readily recognizethe shapes of the different continents, especially Europeand North America. Two white landmarks identify the cit-ies of Paris, France and Torino, Italy.

Further details on the geolocation of the entire Skypepeer dataset are given in Table 2. We stress that, in thiscase, the number of successful geolocation events in-creases significantly since continent and country informa-tion are more easily identified with respect to the preciselongitude and latitude information used early in Fig. 7.

The table shows a breakdown, considering probe versusnon-probe traffic, in peers per continent (left), Europeancountry (center) and Italian city (right). The locations aresorted by decreasing percentage, and only the eight toplocations are listed. The total number of Non-Probe andProbe traffic events is reported at the bottom of the Conti-nent Breakdown table. Elements in bold represent thosethat are geographically closest to the measurement point,i.e., the Politecnico di Torino campus.

Two important considerations can be taken from Table2. First, the probing mechanism tends to treat nearby hostspreferentially: indeed, nearly half of the probed IPs (45.4%)were located in Europe, nearly four times as many as inNorth America (11.9%). This means that the probing mech-anism tends to discover network hosts that are geograph-ically close. Second, the geographical location is muchless important for non-probe traffic: indeed, as the per-centage of peers that are located in Europe actually de-creases (38.2%) with respect to probe traffic, thepercentage of North American peers nearly doubles(23.1%). Considering that users resort to Skype to lowercommunication fees and to keep in contact with otherswho are very distant, we are not surprised that non-probetraffic is more geographically dispersed. Indeed, the rela-tionship among users forces Skype peer selection with re-spect to non-probe traffic. By contrast, the peer discoverymechanisms implemented by one-time probes are drivenby the physical properties of the underlying network. Sim-ilarly, probe traffic is roughly distributed consistent withthe population sizes of Italian cities. Non-probe traffic, onthe other hand, is influenced by user social networks andfavors peers in Torino. The breakdown by EU countriesdoes not show significant differences between probe andnon-probe traffic.

UN

CO

Table 2Peer geolocation: percentage breakdown by continent, European country and Itali

Continent breakdown EU countries breakdown

Non-probe Probe Non-probe P

Europe 38.2 45.4 17.9 FR 2America NO 23.1 11.9 15.4 DE 1Asia 12.1 11.7 13.4 IT 1America SO 3.0 2.7 10.4 NL 1Africa 1.8 2.2 10.0 SWOceania 0.8 0.7 9.0 BEUNKNOWN 21.0 25.4 8.4 PLTOT number 51358 212528 6.3 FI

Please cite this article in press as: D. Rossi et al., Understandj.comnet.2008.10.013

DPR

OO

F

4.3. Peer selection criteria

Fig. 8 shows the pdf of Round-Trip Time (RTT) betweentwo peers, measured as the time elapsed between observ-ing the packet leaving the campus LAN and the responsepacket (if any) being returned. In the case of non-probetraffic, the first sent–received packet pair is used to esti-mate the RTT. This measurement takes into account boththe network and the application latency.

The information in the graphic confirms our previousintuition: the latency of probe traffic is lower than that ofnon-probe traffic. Given Torino’s location, RTTs shorterthan 100 ms are typical of nodes within the European Un-ion, while RTTs of above 100 ms are typical of nodes out-side the EU. Our measurement results suggest that theprobing mechanism is latency driven: the Skype clientprobes for peers based on the information received byother peers, so that low latency peers are more likely tobe selected than higher latency ones. Conversely, the peerselection mechanism is preference driven, where the prefer-ence criterion depends on the user relationships.

We also investigated the degree of ‘‘clustering” of theSkype overlay network. For a given peer p, let the popular-ity be the number of peers that contacted it; i.e., an internal(external) peer has a popularity x if it is contacted by xexternal (internal) peers. The popularity distribution is de-picted in Fig. 9, showing probe and non-probe traffic sepa-rately. Consistent with earlier considerations, non-probetraffic popularity pertains to the degree of clustering ofusers at Politecnico di Torino. Conversely, probe popularity

an city.

Italian cities breakdown

robe Non-probe Probe

1.4 DE7 32.5 Torino 30.0 Roma7.5 PL 21.7 Milano 23.8 Milano5.0 FR 18.9 Roma 17.1 Torino1.2 IT 8.9 Bologna 8.1 Bari8.2 ES 4.7 Bari 5.9 Firenze6.5 BG 4.7 Napoli 5.8 Bologna6.4 SW 4.4 Firenze 4.8 Padova5.8 BE 4.2 Moncalieri 4.4 Napoli

ing Skype signaling, Comput.Netw. (2008), doi:10.1016/

Page 8: Understanding Skype signaling · UNCORRECTED PROOF 64 knowledge, this work is the first investigation of Skype sig- 65 naling traffic:indeed, the study of Skype is madevery com-

E

OF

484

485

486

487

488

489

490

491

492

493

494

495

496

497

498

499

500

501

502

503

504

505

506

507

508

509

510

511

513513

514

515

516

517

518

520520

521

523523

524

525

526

527

528

529

530

531

532

533

534

535

536

537

538

539

540

541

542

543

544

545

546

547

548

549

550

551

552

553

554

555

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

1 10

CD

F

External Peers Popularity

Non-ProbeProbe 0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

1 10 100 1000 10000

CD

F

Internal Peers Popularity

Non-ProbeProbe

Fig. 9. Peer popularity of external (left) and internal (right) peers.

2 Results for other peers are very similar and are not reported here.

8 D. Rossi et al. / Computer Networks xxx (2008) xxx–xxx

COMPNW 3891 No. of Pages 11, Model 3G

8 November 2008 Disk UsedARTICLE IN PRESS

UN

CO

RR

may help to reveal SuperNodes that are probed more fre-quently that random peers. Interestingly, this clearlyemerges from the external flows directed toward internalpeers (right plot of Fig. 9). Indeed, for probe traffic, the pop-ularity metric is 1 in about 65% of the cases; i.e., the inter-nal peer has been contacted by a single external peer. TheCDF then increases until the popularity reaches 10. It re-mains constant thereafter until the popularity reachesmuch higher values (100 or more). This suggests that theinternal peer is a SuperNode that attracts substantial sig-naling traffic from external peers (note that PCs in the cam-pus LAN are not protected by firewalls and use public IPaddresses, so it is very likely that some PC can be electedas a supernode); the phenomenon is similar for probetraffic.

Conversely, in the case of traffic directed toward exter-nal peers, the phenomenon is no longer evident since thenumber of internal clients is much smaller (1700) with re-spect to the external clients (305,000).

4.4. Time correlation over peers

Another interesting property of signaling activity in P2Psystems is the possible periodicity that may be presentwhen contacting other peers. To highlight such periodicity,we extended our definition of time correlation to considerthat the activity pattern Ip(x,t) of peer p evolves both overtime t and for different peers x.

Let Ipðx; iÞ be an indicator function that takes the value 1if peer p is active during the ith time interval

Ipðx; iÞ ¼1 if Ipðx; tÞ > 0; t 2 ½iD; ðiþ 1ÞDÞ0 otherwise:

Ipðx; iÞ is the discrete time equivalent of the activity patternIp(x,t), where D is the quantization time step. Let sp(i) bethe vector of peers that exchange a packet with peer p atinterval i, where N is the total number of peers that ex-change packets with p:

spðiÞ ¼ hIpð1; iÞ; Ipð2; iÞ; . . . ; IpðN; iÞi:

We can then define the normalized peer correlation C(j) as

Please cite this article in press as: D. Rossi et al., Understandj.comnet.2008.10.013

CTED

PR

O

CðjÞ ¼ 1kM

XM

i¼1

hspðiÞ � spðiþ jÞi j–0 ð1Þ

k ¼ Cð0Þ ¼ 1M

XM

i¼1

hsðiÞ � sðiÞi; ð2Þ

where hu � vi is the scalar product between vectors u and vand M is the number of time intervals over which peer cor-relation is averaged.

C(j) represents the average number of peers at interval ithat are also active at interval i + j. The peer correlation isdefined by averaging over M different time intervals andis normalized to the average number of active peers C(0).Intuitively, large values of C(j) indicate that a large fractionof peers are also active after j time intervals. By contrast,other values of C(j) indicate that, after j time intervals,the set of active peers is very different. Finally, if C(j) = 0,then no currently active peer is still active after j timeintervals.

The normalized correlation function is shown in Fig. 10for the same two peers p1 and p2

2 whose activity pattern isplotted in Fig. 4; D = 1s. Spikes at j = 20,40,60,. . . show thatpeers periodically poll previously contacted peers every20 s, which was not obvious from looking at the activity pat-tern. Notice that the most active peer (left plot) featuressmaller spikes, since the average number of active peers,C(0), is rather large. By contrast, peer p2 exchanges informa-tion with a more limited number of peers and periodicallyre-contacts about 1/3 of them every 20 s.

Clearly, by definition, the periodic polling involves dia-logs. Moreover, since the time at which external peers arefirst contacted is jittered, periodic polling does not result innoticeable load spikes that are tied to signaling traffic.

5. Measurements during Skype’s summer outage

As previously stated, one of the characteristics thatmade Skype a very successful application stems from itsrobustness: Skype has been very reliable, almost like aPSTN network.

ing Skype signaling, Comput.Netw. (2008), doi:10.1016/

Page 9: Understanding Skype signaling · UNCORRECTED PROOF 64 knowledge, this work is the first investigation of Skype sig- 65 naling traffic:indeed, the study of Skype is madevery com-

E

OF

556

557

558

559

560

561

562

563

564

565

566

567

568

569

570

571

572

573

574

575

576

577

578

579

580

581

582

583

584

585

586

587

588

589

590

591

592

593

594

595

596

597

598

599

600

0

0.2

0.4

0.6

0.8

1

0 10 20 30 40 50 60 70 80

Peer

cor

rela

tion

j [s]

0

0.2

0.4

0.6

0.8

1

0 10 20 30 40 50 60 70 80

Peer

cor

rela

tion

j [s]

Fig. 10. Time correlation of the most active peer (left plot) and a random peer (right plot).

D. Rossi et al. / Computer Networks xxx (2008) xxx–xxx 9

COMPNW 3891 No. of Pages 11, Model 3G

8 November 2008 Disk UsedARTICLE IN PRESS

RHowever, despite the fact that the Skype overlay has

been fully functional 24/7 over the past few years, therebyconfirming the effectiveness of its self-healing capabilities,Skype suffered an unexpected outage last summer. Quot-ing the official company blog [11], ‘‘On Thursday, 16th Au-gust 2007, the Skype peer-to-peer network becameunstable and suffered a critical disruption. The disruptionwas triggered by a massive restart of our users’ computersacross the globe within a very short time frame as they re-booted after receiving a set of patches through WindowsUpdate.” As we monitored the campus network during thatperiod, we were able to observe the outage: given its ex-treme nature, i.e., the disruption of an Internet-scale over-lay, it is interesting to investigate this event.

We report interesting measurements that were ob-served before, during and after the Skype outage. It tookmore than two days before the Skype engineering teammanaged to get the situation back to normal (see ‘‘Thewords we have all been waiting for”, posted August the18th at 11h00 GMT on [11]) after the problem was firstacknowledged (see ‘‘Problems with Skype login”, postedthe August the 16th at 14h02 GMT). The start time was11AM GMT, which corresponds to the instant at whichwe begin to observe an anomalous (and massive) increase

UN

CO

R

5M

0

5M

Thu 9th Sun 12th Thu 16th

Byt

es

August

50k0

50k

Pack

ets

50k0

50k

Flow

s

0 50

100 150

Clie

nts

Before Duri

Fig. 11. The volume of Skype flows, packets and bytes for the pe

Please cite this article in press as: D. Rossi et al., Understandj.comnet.2008.10.013

CTED

PR

Oin the amount of UDP traffic. The time at which the Skypeengineering team blogged that the situation was back tonormal is considered to be the end time. For reference,we also considered two different time intervals during Au-gust 2007, one week before and one week after the outageperiod:

� Before: from Thu 09 (11AM) to Sat 11 (11AM) of August.� During: from Thu 16 (11AM) to Sat 18 (11AM) of August.� After: from Thu 23 (11AM) to Sat 25 (11AM) of August.

5.1. Traffic volumes

The volume of traffic that we observed during theseperiods is reported in Fig. 11, which includes the numberof clients, flows, packets and bytes observed over 1-mintime windows. Comparing Fig. 11 with Fig. 1, similartrends are observed during the normal Skype operationperiod. However, we note that traffic volumes are smallerin Fig. 11, since August is a typical Italian vacation period(with 15 August being the typical holiday peak). At thesame time, the number of internal active Skype clients(top plot) is very similar before and after the failure, which

Sun 18th Thu 23rd Sun 25th

2007

ng After

riods before, during and after the outage (1 min windows).

ing Skype signaling, Comput.Netw. (2008), doi:10.1016/

Page 10: Understanding Skype signaling · UNCORRECTED PROOF 64 knowledge, this work is the first investigation of Skype sig- 65 naling traffic:indeed, the study of Skype is madevery com-

E

601

602

603

604

605

606

607

608

609

610

611

612

613

614

615

616

617

618

619

620

621

622

623

624

625

626

627

628

629

630

631

632

633

634

635

636

637

638

639

640

641

642

643

644

645

646

647

648

649

650

651

652

653

654

655

656

657

658

659

660

661

662

663

664

665

666

667

668

669

670

671

672

673

674

675

676

677

678

679

680

681

682

683

684

685

686687688689690691692693694695

10 D. Rossi et al. / Computer Networks xxx (2008) xxx–xxx

COMPNW 3891 No. of Pages 11, Model 3G

8 November 2008 Disk UsedARTICLE IN PRESS

CO

RR

allows us to accurately compare measurements during dif-ferent weeks.

Focusing on the two days of Skype outage, a drasticreduction in the number of Skype clients is observed(although a slight decrease was already in progress). Thiscorresponds with an anomalous increase of UDP traffic(in terms of flows and packets). During this period, UDPtraffic largely outweighs TCP traffic, so that it accountsfor almost all packets passing into our campus network.Before and after the Skype outage, UDP traffic volumeswere much lower than the amount of TCP traffic.

Indeed, during the outage, Skype traffic accounted foralmost all (94%) UDP flow and for a very significant portionof UDP packets and bytes (89% and 69%). At the same time,almost all this traffic was generated/received by the 10most active clients; furthermore, the most active Skypenode was responsible of 50% of all bytes, 67% of all packets,and 73% of all flows: a clear overload situation. Thus, dur-ing the outage we observed more than an average 3- and 4-fold increase in number of packets and flows, respectively,and this may increase by up to an order of magnitude forthe most active clients.

5.2. Traffic properties

We now distinguish between probe and non-probe traf-fic to quantify the type of observed signaling traffic. Thetop part of Table 3 distinguishes between probe and non-probe traffic, reporting how many external peers have con-tacted an internal peer with a single-probe packet andhave (or have not) received a reply. Replied probes repre-sents the vast majority of the traffic exchanged on the Sky-pe overlay during normal conditions (before 69.2%, after67.1%), and during the anomalous event (82.5%). Noticethat, during the outage, internal nodes are contacted bymore than 40 million peers, far larger (almost 20 times)than under normal conditions.

Another interesting figure can be gathered from thesedata: the total number of external peers with which ourcampus exchanged traffic during the anomalous event isabout 40 million, more than one order of magnitude largerthan during normal functioning. Even more interesting isthe fact that the most active internal client contacted morethan 11 million peers, a more than 30-fold increase com-pared to the normal operation point (300k peers).

The reported numbers show that the cost of maintain-ing a P2P database may not be negligible, and that, in ad-verse conditions, a single peer can generate the sameamount of traffic as is normally generated by all peersacross an entire campus network.

UNTable 3

External peer type, internal contacts and further traffic details.

Before During After

External peer type No. % No. % No. %Probe 620k 17.3 5.62M 13.9 663k 19.1Replied-probe 2.47M 69.2 33.4M 82.5 2.33M 67.1Non-probe 484k 13.5 1.45M 3.6 481k 13.8Total peers 3.57M 40.5M 3.48MTop-1 peers 376K 11.3M 333K

Please cite this article in press as: D. Rossi et al., Understandj.comnet.2008.10.013

CTED

PR

OO

F

6. Conclusions

In this paper, we investigated Skype signaling traffic bymeans of passive measurements, providing insights intoSkype signaling mechanisms, and allowing for a betterunderstanding of the cost and complexity of managing aP2P architecture. In particular, we observed that Skype sig-naling traffic comprises the following: (i) probe traffic flows,in which a pair of packets are exchanged between two peersand are used to discover new nodes; (ii) periodic heartbeatsflows that are used to exchange information about the statusof peers of interest in the user’s contact network, (iii) longdialog flows that carry the most signaling information andsupport the maintenance of the overlay network.

Our results offer empirical evidence of the fact that Sky-pe prefers to flood the network with short single-probeevents that target many hosts. This may be as effectivefor the purpose of overlay maintenance as it is costly fromthe viewpoint of layer-4 network devices.

Interestingly, Skype performs network discovery byaccounting for geographical peer location (i.e., in terms oflatency), while the overlay network is also influenced bythe user’s network of contacts.

Finally, we report measurements collected during aSkype outage event that lasted two days. During the out-age, we observed a 4-fold increase in the number of flows,a 3-fold increase in the packet sending rate and a 10-foldincrease in the number of contacted peers. At the sametime, the most active peer in our network experienced a10-fold increase in traffic and a 30-fold increase in thenumber of contacted peers, topping 11 million signalingconnections. This gives the sense of the complexity of thealgorithms required to maintain a P2P system.

Acknowledgements

The Italian team was funded by the Italian Ministry ofUniversity, Education and Research (MIUR) through thePRIN project RECIPE.

696697698699700701702703704705706707708709

References

[1] Skype web site, <http://www.skype.com>.[2] International carriers’ traffic grows despite Skype popularity,

TeleGeography Report and Database. Available from: <http://www.telegeography.com/>, December, 2006.

[3] S.A. Baset, H. Schulzrinne, An analysis of the skype peer-to-peerinternet telephony protocol, IEEE Infocom’06, Barcelona, Spain, April2006.

[4] P. Biondi, F. Desclaux, Silver Needle in the Skype, Black HatEurope’06, Amsterdam, The Netherlands, March 2006.

[5] S. Guha, N. Daswani, R. Jain, An experimental study of the skypepeer-to-peer VoIP system, 5th International Workshop on Peer-to-Peer Systems, Santa Barbara, CA, February 2006.

[6] K. Ta Chen, C.Y. Huang, P. Huang, C.L. Lei, Quantifying skype usersatisfaction, ACM Sigcomm’06, Pisa, Italy, September 2006.

[7] K. Suh, D.R. Figuieredo, J. Kurose, D. Towsley, Characterizing anddetecting relayed traffic: a case study using Skype, IEEE Infocom’06,Barcelona, Spain, April 2006.

[8] D. Bonfiglio, M. Mellia, M. Meo, D. Rossi, P. Tofanelli, Revealing skypetraffic: when randomness plays with you, ACM Sigcomm’07, Kyoto,Japan, August 2006.

[9] D. Bonfiglio, M. Mellia, M. Meo, N. Ritacca, D. Rossi, Tracking downskype traffic, IEEE Infocom’08, Phoenix, AZ, 15,17 April 2008.

[10] <http://www.hostip.info>.[11] Skype Heartbeats Archives, <http://heartbeat.skype.com/2007/08/>.

ing Skype signaling, Comput.Netw. (2008), doi:10.1016/

Page 11: Understanding Skype signaling · UNCORRECTED PROOF 64 knowledge, this work is the first investigation of Skype sig- 65 naling traffic:indeed, the study of Skype is madevery com-

710

712712

713714715716717718719720721722723724725726727728729730731

732

734734

735736737738739740741742743744745746747748

749750751752

753

756757758759760761762763764

Networks xxx (2008) xxx–xxx 11

COMPNW 3891 No. of Pages 11, Model 3G

8 November 2008 Disk UsedARTICLE IN PRESS

Dario Rossi was born in Torino, Italy, on asunny sunday of March 1977. He received hisM.Sc. degree in Electronic Engineering in 2001and his Ph.D. in Electronic and Telecommu-nication Engineering in 2005, both fromPolitecnico di Torino. Between September2003 and August 2004 he held a visitingresearcher position in the Computer Sciencedivision at University of California, Berkeley.Since October 2006, he is an Associate Pro-fessor at the INFRES department at EcoleNationale Superieure de Telecommunications

(ENST), in Paris, France. He has coauthored over 30 papers in leadingconferences and journals and currently holds 3 patents. He participated inthe program committees of several conferences including IEEE ICC, IEEE

D. Rossi et al. / Computer

DPR

755755

765766767768769770771

772

IPCCC and IEEE ISCC. He is responsible for several European researchprojects, such as FP7 NAPA-WINE, Celtic TIGER and Celtic TRANS. Hisresearch interests are in the fields of peer-2-peer networks, Internettraffic measurement, sensor and vehicular networks.

Marco Mellia received his Ph.D. in Telecom-munications Engineering in 2001 fromPolitecnico di Torino. From March to October1999 he was with the CS department at Car-negie Mellon University as visiting scholar.From February to March 2002 he visited theSprint Advanced Technology LaboratoriesBurlingame, California, working at the IPMonitoring Project (IPMON). Since April 2001,he is with Electronics Department of Politec-nico di Torino as Assistant Professor. He hasco-authored over 100 papers published in

international journals and presented in leading international conferences,all of them in the area of telecommunication networks. He participated in

UN

CO

RR

E

Please cite this article in press as: D. Rossi et al., Understandj.comnet.2008.10.013

OF

the program committees of several conferences including IEEE Infocom,IEEE Globecom and IEEE ICC. His research interests are in the fields of all-optical networks, traffic measurement and modeling, peer to peersystems.

Michela Meo received the Laurea degree inElectronic Engineering in 1993, and the Ph.D.degree in Electronic and TelecommunicationEngineering in 1997, both from Politecnico diTorino. Since November 1999, she is anAssistant Professor at Politecnico di Torino.She co-authored more than 100 papers, about40 of which are in international journals. Sheedited six special issues of internationaljournals, including ACM Monet, PerformanceEvaluation Journal and Computer Networks.She was in co-chair of three editions of ACM

MSWiM, program co-chair of IEEE QoS-IP 2005, Movenet 2007, IEEE ISCC2009. Her current research interests are in the field of traffic character-ization and classification, peer-to-peer systems, energy efficient

Onetworks.

CTE

ing Skype signaling, Comput.Netw. (2008), doi:10.1016/