Dover, MA (PressExposure) February 19, 2009 -- For the third year in a row, ipoque executives Klaus Mochalski and Hendrik Schulze conducted a comprehensive report measuring and analyzing 1.3 petabytes of Internet traffic â the amount of data equal to 300,000 DVDs â in eight regions of the world.
The study covers the use of about 100 of the most popular Internet protocols including P2P, VoIP, media streaming, instant messaging and many more. In addition to data volume, user number statistics provide a good popularity measure. A content type analysis reveals which kinds of files have been shared in the two most popular P2P networks BitTorrent and eDonkey. For the first time, the study also includes an analysis of average packet sizes of all encountered protocols.
Some of the key findings of the study are:
â¢ P2P generates most traffic in all regions â¢ The proportion of P2P traffic has decreased â¢ BitTorrent is still number one of all protocols, HTTP second â¢ The proportion of eDonkey is much lower than last year â¢ File hosting has considerably grown in popularity â¢ Streaming is taking over P2P users for video content â¢ Usenet, a file sharing alternative for P2P, appears in the statistics for the first time
For the full version of the ipoque Internet Study 2008/2009, printable charts and photos write a short email to email@example.com.
Hendrik Schulze, CTO of ipoque and co-author of the study, is satisfied with the results: âWe collected significant amounts of network data on four continents. The number of Internet service providers (ISPs) included in the study has increased and therefore we could improve the quality and significance of the results.â
About ipoque Founded in Leipzig, Germany, ipoque is the leading European provider of deep packet inspection (DPI) solutions for Internet traffic management and analysis. Designed for Internet service providers, enterprises and educational institutions, ipoque's PRX Traffic Manager allows organizations to effectively monitor, shape and optimize network applications. These include the most critical and hard-to-detect protocols used for peer-to-peer file sharing (P2P), instant messaging (IM), Voice over IP (VoIP), tunneling and media streaming, but also many legacy applications. For further information see http://www.ipoque.com.