{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:07:36Z","timestamp":1767262056709,"version":"3.41.0"},"reference-count":33,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2014,4,8]],"date-time":"2014-04-08T00:00:00Z","timestamp":1396915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2014,4,8]]},"abstract":"<jats:p>In this study we mine one of the few sources of public data available about the interdomain peering ecosytem: PeeringDB [1], an online database where participating networks contribute information about their peering policies, traffic volumes and presence at various geographic locations. Although established to support the practical needs of operators, this data also provides a valuable source of information to researchers. Using BGP data to cross-validate three years of PeeringDB snapshots, we find that PeeringDB membership is reasonably representative of the Internet's transit, content, and access providers in terms of business types and geography of participants, and PeeringDB data is generally up-to-date. We find strong correlations among different measures of network size -- BGP-advertised address space, PeeringDB-reported traffic volume and presence at peering facilities, and between these size measures and advertised peering policies.<\/jats:p>","DOI":"10.1145\/2602204.2602208","type":"journal-article","created":{"date-parts":[[2014,4,8]],"date-time":"2014-04-08T12:24:20Z","timestamp":1396959860000},"page":"20-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":70,"title":["Using peeringDB to understand the peering ecosystem"],"prefix":"10.1145","volume":"44","author":[{"given":"Aemen","family":"Lodhi","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, Georgia, USA"}]},{"given":"Natalie","family":"Larson","sequence":"additional","affiliation":[{"name":"CAIDA, San Diego, California, USA"}]},{"given":"Amogh","family":"Dhamdhere","sequence":"additional","affiliation":[{"name":"CAIDA, San Diego, California, USA"}]},{"given":"Constantine","family":"Dovrolis","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, Georgia, USA"}]},{"given":"kc","family":"claffy","sequence":"additional","affiliation":[{"name":"CAIDA, San Diego, California, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,4,8]]},"reference":[{"unstructured":"\"PeeringDB \" http:\/\/www.peeringdb.com.  \"PeeringDB \" http:\/\/www.peeringdb.com.","key":"e_1_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_2_1","DOI":"10.1109\/TNET.2011.2119327"},{"key":"e_1_2_1_3_1","volume-title":"PAM","author":"Dimitropoulos X.","year":"2006","unstructured":"X. Dimitropoulos , D. Krioukov , G. Riley , and k. claffy, \"Revealing the Autonomous System Taxonomy : The Machine Learning Approach,\" in Proc . PAM , Mar 2006 . X. Dimitropoulos, D. Krioukov, G. Riley, and k. claffy, \"Revealing the Autonomous System Taxonomy: The Machine Learning Approach,\" in Proc. PAM, Mar 2006."},{"doi-asserted-by":"publisher","key":"e_1_2_1_4_1","DOI":"10.1109\/TNET.2009.2020798"},{"doi-asserted-by":"publisher","key":"e_1_2_1_5_1","DOI":"10.1109\/INFOCOM.2006.236"},{"doi-asserted-by":"publisher","key":"e_1_2_1_6_1","DOI":"10.1145\/1921168.1921196"},{"doi-asserted-by":"publisher","key":"e_1_2_1_7_1","DOI":"10.1145\/1384609.1384611"},{"key":"e_1_2_1_8_1","volume-title":"IEEE INFOCOM","author":"Corbo J.","year":"2009","unstructured":"J. Corbo , S. Jain , M. Mitzenmacher , and D. C. Parkes , \" An Economically-Principled Generative Model of AS Graph Connectivity,\" in Proc . IEEE INFOCOM , 2009 . J. Corbo, S. Jain, M. Mitzenmacher, and D. C. Parkes, \"An Economically-Principled Generative Model of AS Graph Connectivity,\" in Proc. IEEE INFOCOM, 2009."},{"unstructured":"\"University of Oregon Route Views Project \" http:\/\/www.routeviews.org\/.  \"University of Oregon Route Views Project \" http:\/\/www.routeviews.org\/.","key":"e_1_2_1_9_1"},{"unstructured":"RIPE NCC \"Routing Information Service (RIS) \" http:\/\/www.ripe.net\/ris\/.  RIPE NCC \"Routing Information Service (RIS) \" http:\/\/www.ripe.net\/ris\/.","key":"e_1_2_1_10_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_11_1","DOI":"10.1145\/2504730.2504735"},{"unstructured":"Cooperative Association of Internet Data Analysis \"CAIDA Data \" http:\/\/www.caida.org\/data.  Cooperative Association of Internet Data Analysis \"CAIDA Data \" http:\/\/www.caida.org\/data.","key":"e_1_2_1_12_1"},{"unstructured":"\"List of Tier-1 ASes \" http:\/\/en.wikipedia.org\/wiki\/Tier 1 network#List of tier 1 networks.  \"List of Tier-1 ASes \" http:\/\/en.wikipedia.org\/wiki\/Tier 1 network#List of tier 1 networks.","key":"e_1_2_1_13_1"},{"unstructured":"\"List of Tier-2 ASes \" http:\/\/en.wikipedia.org\/wiki\/Tier 2 network.  \"List of Tier-2 ASes \" http:\/\/en.wikipedia.org\/wiki\/Tier 2 network.","key":"e_1_2_1_14_1"},{"unstructured":"\"Alexa: The web information company \" http:\/\/www.alexa.com.  \"Alexa: The web information company \" http:\/\/www.alexa.com.","key":"e_1_2_1_15_1"},{"unstructured":"\"The Pirate Bay \" http:\/\/thepiratebay.sx\/.  \"The Pirate Bay \" http:\/\/thepiratebay.sx\/.","key":"e_1_2_1_16_1"},{"key":"e_1_2_1_17_1","first-page":"58","author":"Snijders J.","year":"2013","unstructured":"J. Snijders , \"Peering DB Accuracy: Is blind faith reasonable?\" NANOG 58 , 2013 . J. Snijders, \"PeeringDB Accuracy: Is blind faith reasonable?\" NANOG 58, 2013.","journal-title":"NANOG"},{"volume-title":"Forecast and methodology","year":"2012","unstructured":"Cisco Systems, \"Cisco visual networking index : Forecast and methodology , 2012 -2017.\" Cisco Systems, \"Cisco visual networking index: Forecast and methodology, 2012-2017.\"","key":"e_1_2_1_18_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_19_1","DOI":"10.1145\/1851182.1851194"},{"doi-asserted-by":"publisher","key":"e_1_2_1_20_1","DOI":"10.5555\/1791949.1791951"},{"unstructured":"Google Inc. \"Peering & content delivery \" https:\/\/peering.google.com\/about\/peering policy.html.  Google Inc. \"Peering & content delivery \" https:\/\/peering.google.com\/about\/peering policy.html.","key":"e_1_2_1_21_1"},{"unstructured":"Akamai Technologies \"Peering information \" http:\/\/www.akamai.com\/peering\/.  Akamai Technologies \"Peering information \" http:\/\/www.akamai.com\/peering\/.","key":"e_1_2_1_22_1"},{"unstructured":"Limelight Networks \"Limelight networks peering guidelines \" http:\/\/login.llnw.net\/noauth\/peering.cgi.  Limelight Networks \"Limelight networks peering guidelines \" http:\/\/login.llnw.net\/noauth\/peering.cgi.","key":"e_1_2_1_23_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_24_1","DOI":"10.1145\/2535372.2535390"},{"key":"e_1_2_1_25_1","volume-title":"Peering Strategy Adoption by Transit Providers in the Internet: A Game Theoretic Approach,\" in Proceedings of W-PIN","author":"Lodhi A.","year":"2012","unstructured":"A. Lodhi , A. Dhamdhere , and C. Dovrolis , \" Peering Strategy Adoption by Transit Providers in the Internet: A Game Theoretic Approach,\" in Proceedings of W-PIN , 2012 . A. Lodhi, A. Dhamdhere, and C. Dovrolis, \"Peering Strategy Adoption by Transit Providers in the Internet: A Game Theoretic Approach,\" in Proceedings of W-PIN, 2012."},{"key":"e_1_2_1_26_1","volume-title":"Peer Preference or Peer Pressure?\" in Proceedings of IEEE INFOCOM","author":"Lodhi A.","year":"2014","unstructured":"A. Lodhi , A. Dhamdhere , and C. Dovrolis : Peer Preference or Peer Pressure?\" in Proceedings of IEEE INFOCOM , 2014 . ____, \"Open Peering by Internet Transit Providers: Peer Preference or Peer Pressure?\" in Proceedings of IEEE INFOCOM, 2014."},{"unstructured":"W. Norton \"The Lifecycle of a Peering Inclination \" http:\/\/drpeering.net\/white-papers\/Peering-Policies\/.  W. Norton \"The Lifecycle of a Peering Inclination \" http:\/\/drpeering.net\/white-papers\/Peering-Policies\/.","key":"e_1_2_1_27_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_28_1","DOI":"10.1145\/1644893.1644934"},{"doi-asserted-by":"publisher","key":"e_1_2_1_29_1","DOI":"10.1145\/2342356.2342393"},{"unstructured":"S. Silvius \"Internet Exchange Points: A closer look at the differences between continental Europe and the rest of the world \" https:\/\/www.euro-ix.net\/documents\/894-ix.  S. Silvius \"Internet Exchange Points: A closer look at the differences between continental Europe and the rest of the world \" https:\/\/www.euro-ix.net\/documents\/894-ix.","key":"e_1_2_1_30_1"},{"unstructured":"W. Norton \"A Study of 28 Peering Policies \" http:\/\/drpeering.net\/white-papers\/Peering-Policies\/.  W. Norton \"A Study of 28 Peering Policies \" http:\/\/drpeering.net\/white-papers\/Peering-Policies\/.","key":"e_1_2_1_31_1"},{"key":"e_1_2_1_32_1","volume-title":"The Internet Peering Playbook: Connecting to the Core of the Internet","author":"Norton W.","year":"2012","unstructured":"W. Norton , \" A Study of 28 Peering Policies ,\" http:\/\/drpeering.net\/white-papers\/Peering-Policies\/. , The Internet Peering Playbook: Connecting to the Core of the Internet . DrPeering Press , 2012 . ____, The Internet Peering Playbook: Connecting to the Core of the Internet. DrPeering Press, 2012."},{"key":"e_1_2_1_33_1","volume-title":"GENESIS: An Agent-Based Model of Interdomain Network Formation, Traffic Flow and Economics,\" in IEEE INFOCOM","author":"Lodhi A.","year":"2012","unstructured":"A. Lodhi , A. Dhamdhere , and C. Dovrolis , \" GENESIS: An Agent-Based Model of Interdomain Network Formation, Traffic Flow and Economics,\" in IEEE INFOCOM , 2012 . A. Lodhi, A. Dhamdhere, and C. Dovrolis, \"GENESIS: An Agent-Based Model of Interdomain Network Formation, Traffic Flow and Economics,\" in IEEE INFOCOM, 2012."}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2602204.2602208","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2602204.2602208","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:00:47Z","timestamp":1750230047000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2602204.2602208"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,8]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,4,8]]}},"alternative-id":["10.1145\/2602204.2602208"],"URL":"https:\/\/doi.org\/10.1145\/2602204.2602208","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2014,4,8]]},"assertion":[{"value":"2014-04-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}