On the Impact of P2P File Sharing Traffic Restrictions on User Perceived Performance
|
|
- Baldwin Scott
- 7 years ago
- Views:
Transcription
1 On the Impact of P2P File Sharing Traffic Restrictions on User Perceived Performance Ricardo Lopes Pereira, Teresa Vazão Instituto Superior Técnico Av. Prof. Dr. Cavaco Silva, Porto Salvo, Portugal Abstract Peer to Peer (P2P) File Sharing (FS) applications represent, today, the major traffic source on the Internet. Unlike other traffic types, such as HTTP, where the major traffic sources are identifiable, peers are, by definition, spread over the Internet, making it hard for ISPs to architect their networks to accommodate Peer to Peer traffic. In order to alleviate the impact of P2P FS traffic on other applications, ISPs often resort to price strategies based on traffic or traffic shaping techniques, in order to restrict P2P FS applications usage. The success of these initiatives is often limited, as they may aggravate other customers which do not use P2P FS or be circumvented by some of the P2P FS applications, which try to misrepresent their traffic as belonging to other applications. In this paper we study the impact that different methods for P2P FS traffic reduction have on the traffic carried by ISPs and on the download performance perceived by P2P FS users. Through simulation we compared the usage of traffic shaping with the more recent techniques Biased Neighbour Selection () and Adaptive Search Radius (). We observed that traffic shaping provides ISPs with the fewer traffic savings, especially when compared to the price paid by P2P FS users. and provide similar benefits for users and ISPs. We ve also observed that and are complementary technologies, which may be combined in order to achieve higher efficiency. I. INTRODUCTION Peer-to-Peer (P2P) File Sharing (FS) applications are wildly disseminated. Their popularity is such that several sources indicate that they are responsible for up to 70% of the Internet traffic [1], [2]. Contrary to what was expected by some, the availability of commercial music and video download services and the legal pressure imposed by copyright owners associations, such as RIAA, did not cause P2P FS adoption to slow down. P2P FS traffic exhibits a behaviour very distinct from that of traditional applications such as or HTTP, one that most ISPs networks were not designed to handle [1], [2]: Upstream/downstream ratio: Applications such as HTTP exhibit a very high download/upload ratio, which has used to plan many networks. P2P FS users have incentives to upload as much as they download, and some peers may even operate only as uploaders (seeders). Time of day usage patterns: ISPs expect their user population to follow certain behaviour patters. For instance, home users are only expected to use the network at evening and during weekends. P2P FS applications are often left unattended, running 24 hours a day. Traffic sources: traffic originates mostly from servers within an ISP s own network. HTTP traffic comes primarily from local proxies or from a few well known popular sites. P2P traffic can originate anywhere. A peer might decide to download a file part from a peer within the same ISP or from across the world. Over-Subscription ratios: A typical HTTP user will download a page and then spend some time reading it. This allows ISPs to use large over-subscription ratios, as most of the time users aren t utilising the bandwidth made available to them. The download of a large movie file via P2P may take many hours, while it will only take about two hours to view it. P2P FS users will download/upload almost continuously. P2P FS traffic increases ISPs transit and peering costs while affecting the performance of other applications, which can alienate costumers, increasing costumer churn. Upgrading the network to higher bandwidth is not an option as the increased cost would not be compensated by additional revenue. Furthermore, as P2P FS applications are designed to consume as much bandwidth as possible, the new bandwidth would rapidly be consumed. Blocking P2P FS traffic isn t an option either, as P2P FS applications are one of the drivers behind broadband adoption. Doing it would most likely result in the loss of large numbers of subscribers. The increasing usage of P2P FS technology for independent and commercial music, video and software distribution means that the problem is here to stay, and ISPs and P2P FS users must find ways to balance their goals. The main contribution of this paper is a simulation study of some of the options available for minimising the impact of P2P FS traffic on the Internet and on ISPs business. We compare the tradeoff between the traffic savings reaped by an ISP and the performance impact suffered by its P2P using costumers when using three different techniques: traffic shaping, Biased Neighbour Selection () and Adaptive Search Radius (). We ve found that these technologies are complementary, and also studied the effect of combining them. The second contribution is the utilisation of a simulation model which implements the full dynamics of a real P2P protocol (edonkey), taking into account all the effects at the network, transport and application layers, instead of a simple abstraction.
2 In the next section the traffic saving techniques are discussed, along with other methods for reducing the cost incurred by ISPs with P2P FS. Section III presents the simulation study and its findings. Section IV presents the conclusions and plans for future work. II. COST REDUCTION TECHNIQUES It has been observed that P2P FS shows strong locality properties, both in terms of network topology and geography, suggesting that self-caching mechanisms could be enacted by forcing peers to download from nearby peers instead of distant ones [3], [4]. Self-caching would potentially result in better performance for users and lower costs for ISPs. and are two techniques that explore these locality properties. Traffic shaping is a more traditional approach, which limits the amount of bandwidth made available to P2P applications. A. Biased neighbour selection Biased Neighbour Selection is a technique proposed for use with the BitTorrent protocol [5]. It consists of using a transparent redirector, which intercepts the communication from peers inside an ISP s network with the tracker. The sources (peers) provided by the tracker are filtered and replaced in order to force the peer to communicate mainly with other peers within the ISP s network. Only a few peers from outside the ISP s network are provided, to ensure that the download will complete successfully. requires ISPs to run the query interceptors at the edge of their networks, using deep packet inspection in order to intercept communications to the tracker/server and other peers (due to peer source exchange and the growing use of Kademlia). It is a solution that each ISP may choose to use on its own, limiting the amount of traffic exchanged with other ISPs while benefiting users, which are expected to download faster from within their own ISP s network. reduces the costs incurred by an ISP when there are enough sources for the file within its network. Otherwise it provides no advantages, as the files will have to be downloaded from the outside. Furthermore it also fails to reduce the amount of upload traffic, as it doesn t prevent outside peers from downloading from the peers within the ISP s network. The basic concept of had already been suggested before in studies conducted on traffic traces of Kazaa and BitTorrent, where byte hit ratios of up to 63% were estimated to be achievable by exploring locality properties within an ISP [6], [7]. B. Adaptive Search Radius consists of a peer selection algorithm which can be used with emule, BitTorrent or other P2P file sharing applications [8]. Instead of downloading from any peer, selects a subset of the peers it knows, the nearest ones (fewer IP network hops), allowing the file download to be performed with a smaller impact on the Internet. uses file availability as a metric. This is defined as the number of contactable peers sharing the rarest file part the peer doesn t already have. As uploaders are contacted, their distance (in network hops) and the file parts they share are determined. Minimum and maximum file availability thresholds are defined as constant values in the algorithm. An peer maintains a value for the Search Radius of every file, the maximum distance (in network hops) a peer may be in order to be considered. After learning (or updating) which file parts a peer shares, the file availability is calculated. If the file availability is larger than the maximum threshold, the search radius is reduced by one hop while it remains larger than the minimum threshold. If all peers within the search radius have been contacted but file availability remains below the minimum threshold, the search radius is increased one hop. will result in the use of file sources local to the ISPs network when these are available. When contacting peers outside an ISP s network, the closest ones will be used. Figure 1 depicts the behaviour of a P2P file sharing client (node H) while downloading a file. Filled circles represent peers, empty ones represent routers. Filled lines represent links not being used by file transfers to peer H, while dotted lines represent links crossed by file transfer traffic. Node H, through the use of a file sharing P2P protocol, has learned that nodes A to I share the wanted file. In figure 1(a), peer H does not use to filter out distant peers, downloading from all of them. Therefore, download traffic crosses most links, contributing to their congestion. Figure 1(b) shows what happens when is used. In this example, it is assumed that calculated a search radius of 4 network hops. This means, that peers F (4 hops), G (2 hops) and I (3 hops), together provide the required minimum number of sources for all the pieces peer H still has to download. As peers restrain from downloading from peers outside the search radius for each file, information travels fewer network hops, releasing capacity on all other links. Peer H still needs to download a full copy of the file, but the download, being performed from close peers, impacts fewer Internet links. The decreased number of peers to download from is compensated by having to wait less to start downloading, as upload queues are shorter. Since each downloading peer will restrict the set of peers it downloads from, each uploader will have to satisfy fewer requests. should result in lower P2P traffic crossing ISP s boundaries while providing users with faster downlodas. However, this is not a method that ISPs can deploy on their own. Instead it would have to be built into P2P software. C. Traffic shaping In order to control the impact of P2P FS traffic on their networks, many ISPs have deployed traffic shaping equipment. This performs deep packet inspection on incoming or outgoing traffic, in order to determine the traffic flows which correspond to P2P FS sessions. Having identified P2P FS traffic, QoS techniques may be applied to it. ISPs may choose to limit the aggregate rate of P2P FS traffic, the rate of individual users traffic or provide all P2P FS traffic with a less than best effort treatment. This allows ISPs to limit the effect P2P FS has on
3 (a) Without (b) With using search radius of 4 Fig. 1. Links crossed by file download traffic by node H their networks, benefiting other applications, without requiring additional investments in bandwidth. However, P2P FS traffic is difficult to identify as developers continuously try to circumvent detection. This means that some P2P FS traffic will always get past unidentified. The risk for false positives also exists. Furthermore, the processing required for deep packet inspections may cause some delay on all traffic [2]. This may alienate some subscribers. Traffic shaping affects all P2P FS traffic equally. Even though users may not have the right to complaint that their illegal downloads are slow, they will protest when it affects their rightful downloading activities [1]. This may cause legal problems for ISPs, which may be accused of favouring other commercial content distribution methods, especially when network neutrality is being discussed in some countries. D. Other methods Some ISPs have abandoned unlimited traffic subscription plans or increased their prices. Users are now offered different subscription plans, with different monthly bandwidth allowances. Extra traffic is charged at high rates, which discourages heavy P2P FS usage. This transfers the costs associated with P2P FS traffic back to the users responsible for the traffic. However, it also impacts other heavy users, not only P2P FS users. Furthermore, it overlooks that P2P FS traffic has been one of the drivers behind broadband adoption. This method will only work when there is no competition offering unlimited plans, as otherwise it will result in subscribers leaving for the competition. ISPs have also taken advantage of P2P FS protocols reciprocity, which provide peers with download speeds correlated to their upload speed. Many ISPs restrict the upload speed well beyond that imposed by the access technology used to connect the subscribers. One such example is the use of ADSL, where even though the maximum download speed is often used, only a fraction of the possible upload speed is offered. P2P FS cache is a concept similar to HTTP caches, with which ISPs are familiar. Caches intercept P2P connections going outside the ISP s network and impersonate remote peers. If the content is present in the cache, it will be served locally, otherwise the remote peer will be contacted by the cache, which will keep a copy of the content while delivering it to the requesting peer. Byte hit ratios as high as 80% are claimed by P2P caching solution vendors [1]. The use of caches provides P2P FS users with similar or better performance, while releasing bandwidth for other applications, allowing ISPs to avoid or delay investments into network upgrades. However, running a cache may implicate an ISPs in illegal sharing of copyrighted content, subjecting it to legal problems. Also, it has been observed that large video files are the fastest growing file type in P2P networks, representing the largest (65%) portion of bytes transfered. These files are the ones a cache system should address, however, their size and number require too large a storage system to be easily performed outside the P2P network [6]. A. Simulation scenario III. EVALUATION We evaluated, and traffic shaping using the SSFNet 2.0 network simulator, which provides the Layer 2,3 and 4 [9]. On it, we implemented the edonkey/emule protocol. We used the GT-ITM topology generator to create a transitstub network with 350 routers and 840 P2P FS peers [10]. Hosts are connected to their routers using 0.5 and 1Mb/s links. Stub routers are connected among themselves using 5 and 10 Mb/s links. Stub networks are connected to each other and to transit networks using 2 and 5 Mb/s links. Transit routers are connected using 10, 20 and 50Mb/s links. Transit networks are connected using 10 and 20Mb/s links. We simulated the distribution of a 100MB file, seeded by 7 peers to the other 834. This depicts a situation where a company uses P2P FS to distribute some content (for instance e-learning) to their various offices, or a flash crowd where hosts continue to share after finishing their downloads.
4 Each time a peers asked the server for file sources, it would reply with at most 50 peers. When using, of this 50 peers, up to 40, if available, would be within its own ISP. was configured to increase its search radius when the file availability was below 3 and to reduce it when file availability was greater than 6. Traffic shaping was used by limiting the aggregate P2P FS bandwidth permitted on the stub-stub and stub-transit links, using a bit-bucket. We experimented limiting the available P2P FS bandwidth to 4, 3, 2, 1 and 0.5 Mb/s. I ve also decided to combine the use of both and, being that these are not conflicting technologies. The use of will allow to converge on close-by peers more quickly, as the peers it learns about will be mostly within the same ISP. From the point of view of, the use of will allow the peer to choose the closest peers from within the ISP, instead of using a random set. Also, while is unable to provide traffic savings when there are no sources within the same ISP, will download from the closer peers. B. Result analysis Table I shows the main metrics gathered from the experiments. We can observe that both, and their combination provide significant improvements on all metrics over the use of plain edonkey/emule, both from the point of view of the ISPs and of the subscriber. From the subscriber perspective, any of the alternatives, alone, result in noticeably faster downloads, with having a slight advantage. Their combination provides even better results. This means that users would not feel alienated by any of these technologies but rather have the feeling that the ISP embraces P2P FS, which could result in increased costumer loyalty. From the point of view of a transit ISP, both and result in very significant traffic savings, which could be translated into better and cheaper services for their regional ISP costumers. The combination of and results in the release of more than two thirds of the used bandwidth. From the point of view of the regional ISP, which provides the service for the P2P FS users, the use of or results in a reduction of the intra-isp (stub) traffic and in an even more significant reduction of the traffic exchanged with the other ISPs (inter-isp). The combined use of and TABLE I COMPARING THE DIFFERENT TECHNIQUES / Avg. Download Time (s) Transit Traffic (GB) Stub Traffic (GB) Inter-ISP Traffic (GB) Number of Connections (K) Avg. Hops Crossed Efficiency (%) results in even more savings, especially on the inter-isp traffic, which is reduced to less than a third. The large reduction in inter-isp traffic would allow ISPs to significantly reduce their peering and transit costs, which could provide a competitive advantage. Also significant is the reduction in terms of number of connections necessary to distribute the file. Here we see that has an advantage over, but not over their combined use. Even though the number of connections affects primarily the peers, being that TCP is an end-to-end protocol, the fewer connections to keep track of allow for better scaling of any deep packet inspection equipment used by complementary techniques. We can also observe that the average number of network hops crossed by each P2P FS data packet is reduced by the use of and even more by the use of. Their combined use yields the best results. The last metric used was efficiency, were we measure the amount of traffic which crossed every network link against the ideal minimum traffic required to copy the file from the sources to all the other peers. The minimum traffic was calculated by determining the number of links present in the minimum spanning tree rooted at all the sources, which encompassed all the downloading peers. The number of links was them multiplied by the size of the file. It would be impossible for any protocol to reach 100% efficiency as this does not take into account any of the protocol overheads suffered by the real protocols (IP, TCP, edonkey/emule). Once again we can observe that the use of or is advantageous, with having an edge over. Their combination is, once again, very beneficial. Figure 2 show the evolution of the amount of inter-isp traffic used when the allowed inter-isp bandwidth is varied by traffic shaping. We can observe that significant savings are only accomplished when the bandwidth is reduced to 1Mb/s. The reduction of the bandwidth from 1 to 0.5 Mb/s results in a faster decrease in the traffic consumption. The different techniques maintain their relative positions with the different bandwidths, except for 0.5Mb/s, where provides much greater savings than, indicating that copes better with traffic shaping. Figure 3 shows the behaviour of the average download time achieved by the several techniques under different traffic shaping restrictions. It is noticeable that users pay a high price for the use of traffic shaping. The plain edonkey/emule protocol would not allow ISPs to reduce P2P FS traffic below the 2Mb/s, in this particular scenario, or they would witness massive subscriber churn. However, only bellow this mark were traffic saving noticeable. shows a much better behaviour, but it would also prevent the use of 0.5Mb/s, and even 1Mb/s could be risky. show a behaviour very close to that of and combined, and both methods would allow P2P FS traffic to be limited to 1Mb/s without causing major annoyance to subscribers. Figure 4 shows the evolution of the traffic efficiency of the several techniques under different traffic shaping restraints. It
5 Inter-ISP P2P FS traffic (GB) / Efficiency (%) / Fig. 2. Amount of traffic exchanged among ISPs versus allowed bandwidth Fig. 4. Efficiency of the several techniques under different bandwidths Average download duration (s) Fig / 0 Behaviour of download time with different bandwidths is observable that the relative positions are always maintained. However, we can see that combined with and, especially, by it self, react better to severe bandwidth restrictions, increasing their efficiency. Under the 0.5 Mb/s, the plain edonkey/emule protocol reduced its performance, as the reduced bandwidth becomes insufficient for both data and control messages, reducing each peer capacity do discover new, closer-by peers. IV. CONCLUSIONS We analysed the impact of three different bandwidth saving techniques, which have the potential to reduce ISP s costs with P2P FS traffic: Biased Neighbour Selection, Adaptive Search Radius and Traffic Shaping. We ve used a network simulator and a faithful implementation of the edonkey/emule protocol to analyse the impact of every combination of the above techniques on the traffic carried and exchanged by an ISP and on the download time perceived by subscribers. We ve concluded that the techniques are complementary, and that they may be combined, all three, in order to achieve the best results. Traffic shaping, of the three the only technique which is wildly deployed, proved to be the least effective. Not only does it provide modest traffic reduction, but renders P2P FS unusable, due to the very high download times. and, being very different by design, provide similar results. provided slightly faster downloads and slightly higher inter-isp traffic savings which result in more immediate advantages for ISPs. However, generates slightly greater savings for the transit ISPs, which could result in cheaper transit rates for regional ISPs. also behaves better when combined with extreme traffic shaping, providing greater inter-isp traffic savings and faster downloads. The best results were, under every circumstance, achieved by the combination of and. REFERENCES [1] PeerApp. (2007, Mar.) Comparing P2P Solutions. White Paper. [Online]. Available: [2] Sandvine. (2004) Meeting the Challenge of Today s Evasive P2P Traffic. White Paper. [Online]. Available: general/getfile.asp?fileid=16 [3] J. Chu, K. Labonte, and B. N. Levine, Availability and Locality Measurements of Peer-to-Peer File Systems, in ITCom: Scalability and Traffic Control in IP Networks, [4] A. Klemm, C. Lindemann, M. K. Vernon, and O. P. Waldhorst, Characterizing the query behavior in peer-to-peer file sharing systems. in Internet Measurement Conference, A. Lombardo and J. F. Kurose, Eds. ACM, 2004, pp [5] R. Bindal, P. Cao, W. Chan, J. Medval, G. Suwala, T. Bates, and A. Zhangan, Improving Traffic Locality in BitTorrent via Biased Neighbor Selection, in ICDCS, July [6] P. K. Gummadi, R. J. Dunn, S. Saroiu, S. D. Gribble, H. M. Levy, and J. Zahorjan, Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. in SOSP, 2003, pp [7] T. Karagiannis, P. Rodriguez, and D. Papagiannaki, Should ISPs fear Peer-Assisted Content Distribution? in ACM SIGCOMM/USENIX IMC 05, Oct [8] R. L. Pereira, T. Vazão, and R. Rodrigues, Adaptive Search Radius - Lowering Internet P2P File-Sharing Traffic through Self-Restraint, in The 6th IEEE International Symposium on Network Computing and Applications (IEEE NCA07), [9] J. H. Cowie, D. M. Nicol, and A. T. Ogielski, Modeling the Global Internet, Computing in Science & Engineering, vol. 1, no. 1, pp , [10] E. W. Zegura, K. L. Calvert, and S. Bhattacharjee, How to model an internetwork, in INFOCOM, 1996, pp
Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic
Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic William Acosta and Surendar Chandra University of Notre Dame, Notre Dame IN, 46556, USA {wacosta,surendar}@cse.nd.edu Abstract.
More informationShould Internet Service Providers Fear Peer-Assisted Content Distribution?
Should Internet Service Providers Fear Peer-Assisted Content Distribution? Thomas Karagiannis, UC Riverside Pablo Rodriguez, Microsoft Research Cambridge Konstantina Papagiannaki, Intel Research Cambridge
More informationThe Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationLecture 6 Content Distribution and BitTorrent
ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Lecture 6 Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent
More informationOn the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu
On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu Dilip Kumar Krishnappa, Samamon Khemmarat, Lixin Gao, Michael Zink University of Massachusetts Amherst,
More informationMulticast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
More information3. Some of the technical measures presently under consideration are methods of traffic shaping, namely bandwidth capping and bandwidth shaping 2.
THE IDENTIFIED EMERGING POLICY RESPONSES 1. INSERT Traffic shaping 2. The UK Parliament is presently considering introducing technical measures to tackle the problem of unlawful peer-to-peer (P2P) file-sharing.
More informationDisk Storage Shortfall
Understanding the root cause of the I/O bottleneck November 2010 2 Introduction Many data centers have performance bottlenecks that impact application performance and service delivery to users. These bottlenecks
More information1. Comments on reviews a. Need to avoid just summarizing web page asks you for:
1. Comments on reviews a. Need to avoid just summarizing web page asks you for: i. A one or two sentence summary of the paper ii. A description of the problem they were trying to solve iii. A summary of
More informationIPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha
IPTV AND VOD NETWORK ARCHITECTURES Diogo Miguel Mateus Farinha Instituto Superior Técnico Av. Rovisco Pais, 1049-001 Lisboa, Portugal E-mail: diogo.farinha@ist.utl.pt ABSTRACT IPTV and Video on Demand
More informationFrom Centralization to Distribution: A Comparison of File Sharing Protocols
From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015
More informationarxiv:1011.1892v1 [cs.ni] 8 Nov 2010
Pushing Locality to the Limit Stevens Le Blond a, Arnaud Legout a,, Walid Dabbous a a INRIA, EPI Planete, 004 route des lucioles, B.P. 93, 0690 Sophia Antipolis CEDEX, France arxiv:0.89v [cs.ni] 8 Nov
More informationD. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)
v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best
More informationPeer to peer networking: Main aspects and conclusions from the view of Internet service providers
Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Gerhard Haßlinger, Department of Computer Science, Darmstadt University of Technology, Germany Abstract:
More informationSimulation of Heuristic Usage for Load Balancing In Routing Efficiency
Simulation of Heuristic Usage for Load Balancing In Routing Efficiency Nor Musliza Mustafa Fakulti Sains dan Teknologi Maklumat, Kolej Universiti Islam Antarabangsa Selangor normusliza@kuis.edu.my Abstract.
More informationA Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
More informationA Measurement Study of Peer-to-Peer File Sharing Systems
CSF641 P2P Computing 點 對 點 計 算 A Measurement Study of Peer-to-Peer File Sharing Systems Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble Department of Computer Science and Engineering University
More informationBitTorrent Peer To Peer File Sharing
BitTorrent Peer To Peer File Sharing CS290F: Networking for Multimedia Mini PhD Major Area Exam I) Introduction Content distribution is an important topic in networking and has been evolving from the start
More informationWAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks
WAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks K. D. Cho et al., IEEE INFOCOM 2012 Workshop, pp. 316-321, March 2012. January 17, 2013 Byeong-Gi Kim Park Laboratory,
More informationIncentives Build Robustness in BitTorrent
Incentives Build Robustness in BitTorrent Bram Cohen bram@bitconjurer.org May 22, 2003 Abstract The BitTorrent file distribution system uses tit-fortat as a method of seeking pareto efficiency. It achieves
More informationAn Efficient Load Balancing Technology in CDN
Issue 2, Volume 1, 2007 92 An Efficient Load Balancing Technology in CDN YUN BAI 1, BO JIA 2, JIXIANG ZHANG 3, QIANGGUO PU 1, NIKOS MASTORAKIS 4 1 College of Information and Electronic Engineering, University
More informationEvaluating Cooperative Web Caching Protocols for Emerging Network Technologies 1
Evaluating Cooperative Web Caching Protocols for Emerging Network Technologies 1 Christoph Lindemann and Oliver P. Waldhorst University of Dortmund Department of Computer Science August-Schmidt-Str. 12
More informationCharacterizing the Query Behavior in Peer-to-Peer File Sharing Systems*
Characterizing the Query Behavior in Peer-to-Peer File Sharing Systems* Alexander Klemm a Christoph Lindemann a Mary K. Vernon b Oliver P. Waldhorst a ABSTRACT This paper characterizes the query behavior
More informationModeling an Agent-Based Decentralized File Sharing Network
Modeling an Agent-Based Decentralized File Sharing Network Alex Gonopolskiy Benjamin Nash December 18, 2007 Abstract In this paper we propose a distributed file sharing network model. We take inspiration
More informationHow To Analyse The Edonkey 2000 File Sharing Network
The edonkey File-Sharing Network Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf Steinmetz Multimedia Kommunikation (KOM) Technische Universität Darmstadt Merckstr. 25, 64293 Darmstadt (heckmann, bock,
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationSimulating a File-Sharing P2P Network
Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance
More informationNetwork Level Multihoming and BGP Challenges
Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology jili@cc.hut.fi Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.
More informationABSTRACT Acknowledgments List of Abbreviations Contents ABSTRACT 3 Acknowledgments 5 List of Abbreviations 7 List of Figures 15 List of Tables 23 1 Introduction 25 2 Motivation and background 29 3 Overview
More informationDeploying in a Distributed Environment
Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each
More informationOn-Demand Media Streaming Over the Internet
On-Demand Media Streaming Over the Internet Mohamed M. Hefeeda and Bharat K. Bhargava CERIAS and Department of Computer Sciences Purdue University West Lafayette, IN 47907 {mhefeeda, bb}@cs.purdue.edu
More informationInternet Anonymity and the Design Process - A Practical Approach
anon.next: A Framework for Privacy in the Next Generation Internet Matthew Wright Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA, mwright@uta.edu,
More informationExperimentation with the YouTube Content Delivery Network (CDN)
Experimentation with the YouTube Content Delivery Network (CDN) Siddharth Rao Department of Computer Science Aalto University, Finland siddharth.rao@aalto.fi Sami Karvonen Department of Computer Science
More informationPERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
More informationPeer to peer networks: sharing between peers. Trond Aspelund
Peer to peer networks: sharing between peers Trond Aspelund Abstract In this literature survey we look at peer-to-peer networks. We first see how peer-to-peer networks distinguish themselves from the client/server
More informationPeer-to-Peer File Sharing
The Effects of File Sharing on a Service Provider's Network An Industry White Paper Copyright July 2002, Sandvine Incorporated www.sandvine.com 408 Albert Street Waterloo, Ontario Canada N2L 3V3 Executive
More informationDatagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
More informationExamining the Impact of the Earthquake on Traffic on a Macro Level
3. Broadband Traffic Report Examining the Impact of the Earthquake on Traffic on a Macro Level The Great East Japan Earthquake in March 2 also caused extensive damage to communications infrastructure.
More informationAn apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
More informationPreparing Your IP Network for High Definition Video Conferencing
WHITE PAPER Preparing Your IP Network for High Definition Video Conferencing Contents Overview...3 Video Conferencing Bandwidth Demand...3 Bandwidth and QoS...3 Bridge (MCU) Bandwidth Demand...4 Available
More informationThe Performance and Locality Tradeoff in BitTorrent-like P2P File-Sharing Systems
The Performance and Locality Tradeoff in BitTorrent-like P2P File-Sharing Systems Wei Huang, Chuan Wu, Francis C.M. Lau Department of Computer Science, The University of Hong Kong {whuang,cwu,fcmlau}@cs.hku.hk
More informationThe BitTorrent Protocol
The BitTorrent Protocol Taken from http://www.cs.uiowa.edu/~ghosh/bittorrent.ppt What is BitTorrent? Efficient content distribution system using file swarming. Usually does not perform all the functions
More informationEvaluating the Effectiveness of a BitTorrent-driven DDoS Attack
Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Jurand Nogiec University of Illinois Fausto Paredes University of Illinois Joana Trindade University of Illinois 1. Introduction BitTorrent
More informationINCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
More informationAnalysis on Leveraging social networks for p2p content-based file sharing in disconnected manets
Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: medeepusony@gmail.com # K.Meena 2, Assistant Professor
More informationNetwork congestion control using NetFlow
Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.
More informationInternet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
More informationThe Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public
The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com Introduction Well understood facts: o Fast is better than slow but it costs more to be fast o Network has to be fast and
More informationClustering in Peer-to-Peer File Sharing Workloads
Clustering in Peer-to-Peer File Sharing Workloads F. Le Fessant, S. Handurukande, A.-M. Kermarrec & L. Massoulié INRIA-Futurs and LIX, Palaiseau, France EPFL, Lausanne, Switzerland Microsoft Research,
More informationHW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009
HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer
More informationTechnical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
More informationLecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at
Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at distributing load b. QUESTION: What is the context? i. How
More informationInternet Content Distribution
Internet Content Distribution Chapter 2: Server-Side Techniques (TUD Student Use Only) Chapter Outline Server-side techniques for content distribution Goals Mirrors Server farms Surrogates DNS load balancing
More informationTraceroute-Based Topology Inference without Network Coordinate Estimation
Traceroute-Based Topology Inference without Network Coordinate Estimation Xing Jin, Wanqing Tu Department of Computer Science and Engineering The Hong Kong University of Science and Technology Clear Water
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationUnderstanding the Roles of Servers in Large-scale Peer-Assisted Online Storage Systems
Understanding the Roles of Servers in Large-scale Peer-Assisted Online Storage Systems Fangming Liu, Ye Sun, Bo Li, Xinyan Zhang Hong Kong University of Science & Technology, Roxbeam Inc. Abstract Online
More informationNetwork Management, Performance Characteristics, and Commercial Terms Policy. (1) mispot's Terms of Service (TOS), viewable at mispot.net.
Network Management, Performance Characteristics, and Commercial Terms Policy Consistent with FCC regulations 1, Agri-Valley Broadband, Inc., d/b/a mispot (mispot) provides this information about our broadband
More informationShould Internet Service Providers Fear Peer-Assisted Content Distribution?
Should Internet Service Providers Fear Peer-Assisted Content Distribution? Thomas Karagiannis U.C. Riverside Pablo Rodriguez Microsoft Research Konstantina Papagiannaki Intel Research Cambridge Abstract
More informationIs Your Network Ready for VoIP? > White Paper
> White Paper Tough Questions, Honest Answers For many years, voice over IP (VoIP) has held the promise of enabling the next generation of voice communications within the enterprise. Unfortunately, its
More informationOptimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding
International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar
More informationThe Value of a Content Delivery Network
September 2010 White Paper The Value of a Content Delivery Network Table of Contents Introduction... 3 Performance... 3 The Second Generation of CDNs... 6 Conclusion... 7 About NTT America... 8 Introduction
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationTowards a Peer-to-Peer Extended Content Delivery Network
Towards a Peer-to-Peer Extended Content Delivery Network Daniel Pakkala and Juhani Latvakoski VTT Electronics, Kaitoväylä 1, P.O. Box 1100, FIN-90571 Oulu, Finland E-mail: {Daniel.Pakkala, Juhani.Latvakoski}@vtt.fi
More informationBandwidth Management for Peer-to-Peer Applications
Overview Bandwidth Management for Peer-to-Peer Applications With the increasing proliferation of broadband, more and more users are using Peer-to-Peer (P2P) protocols to share very large files, including
More informationNetwork Positioning System
Network Positioning System How service provider infrastructure can support rapid growth of video, cloud and application traffic Stefano Previdi sprevidi@cisco.com Distinguished Engineer Cisco Systems 1
More informationMonitoring Challenges and Approaches for P2P File-Sharing Systems
Monitoring Challenges and Approaches for P2P File-Sharing Systems Danny Hughes Computing, InfoLab21, Lancaster University, Lancaster, UK. +44 (0)1524 510351 danny@comp.lancs.ac.uk James Walkerdine Computing,
More informationIPDR vs. DPI: The Battle for Big Data
IPDR vs. DPI: The Battle for Big Data An Incognito White Paper January 2016 2016 Incognito Software Systems Inc. All rights reserved. Contents Summary... 2 IPDR vs. DPI... 3 Overview of IPDR... 3 Overview
More informationA Measurement of NAT & Firewall Characteristics in Peer to Peer Systems
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands l.dacunto@tudelft.nl
More informationPeer-to-Peer (P2P) applications, including both P2P streaming and P2P
Description of Working Group Peer-to-Peer (P2P) applications, including both P2P streaming and P2P file-sharing applications, make up a large fraction of traffic in the Internet today. One way to reduce
More informationDistributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
More informationA Complex Network Structure Design for Load Balancing and Redundant
A Complex Network Structure Design for Load Balancing and Redundant Fengming M. Chang Department of Industrial Engineering and Management Tungfang Institute of Technology, Kaohsiung, Taiwan data@nckualumni.org.tw
More informationmodeling Network Traffic
Aalborg Universitet Characterization and Modeling of Network Shawky, Ahmed Sherif Mahmoud; Bergheim, Hans ; Ragnarsson, Olafur ; Wranty, Andrzej ; Pedersen, Jens Myrup Published in: Proceedings of 6th
More informationThe Challenges of Stopping Illegal Peer-to-Peer File Sharing
The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:
More informationSE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S.
BitTorrent Technology How and why it works SE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S. Kartik Krishnan 1 Abstract BitTorrent
More informationLocation Information Services in Mobile Ad Hoc Networks
Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent
More informationBest Practices - Monitoring and Controlling Peer-to-Peer (P2P) Applications
Best Practices - Monitoring and Controlling Peer-to-Peer (P2P) Applications APPLICATION Peer-to-Peer (P2P) EXAMPLES AudioGalaxy, edonkey, BitTorrent, KaZaA, etc. USAGE Locate and exchange (swap) files.
More informationGlobal Server Load Balancing
White Paper Overview Many enterprises attempt to scale Web and network capacity by deploying additional servers and increased infrastructure at a single location, but centralized architectures are subject
More informationOracle Applications Release 10.7 NCA Network Performance for the Enterprise. An Oracle White Paper January 1998
Oracle Applications Release 10.7 NCA Network Performance for the Enterprise An Oracle White Paper January 1998 INTRODUCTION Oracle has quickly integrated web technologies into business applications, becoming
More informationCloud4 User Guide Reliable connectivity for the cloud from Cloud4
Cloud4 User Guide Reliable connectivity for the cloud from Cloud4 Choosing the right broadband for your business If you ve ever shopped around for a good broadband deal for your home then you might have
More informationAnonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.
More informationRevisiting P2P content sharing in wireless ad hoc networks
Revisiting P2P content sharing in wireless ad hoc networks Mohamed Karim SBAI, Chadi BARAKAT EPI Planète, INRIA, France Email: {mksbai, cbarakat}@sophia.inria.fr Abstract. Classical content sharing applications
More informationA Link Load Balancing Solution for Multi-Homed Networks
A Link Load Balancing Solution for Multi-Homed Networks Overview An increasing number of enterprises are using the Internet for delivering mission-critical content and applications. By maintaining only
More informationIn this whitepaper we will analyze traffic for the broadband access services that IIJ operates, and present our findings.
2 2.1 Introduction In this whitepaper we will analyze traffic for the broadband access services that IIJ operates, and present our findings. It has been reported that growth in Internet traffic levels
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
More informationThree short case studies
Three short case studies peer to peer networking wireless systems search engines each includes issues of hardware processors, storage, peripherals, networks,... representation of information, analog vs.
More informationScalable Data Collection for Internet-based Digital Government Applications
Scalable Data Collection for Internet-based Digital Government Applications [ Appeared in Proceedings of the 1st National Conference on Digital Government Research, 2001 ] W. C. Cheng C.-F. Chou L. Golubchik
More informationFormal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
More informationBEGINNER S GUIDE TO DOWNTIME
BEGINNER S GUIDE TO DOWNTIME DOWNTIME, WHAT IS IT? We talk a lot about the internet running slow or going down but few of us actually know what is happening in those situations. In order to help you get
More informationDepartment of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
More informationMultimedia transmission in a managed P2P network: making sense?
Multimedia transmission in a managed P2P network: making sense? L. Xu 1, A. Ksentini 2, K. Singh 1, G. Rubino 1, G. Straub 3, Y. L Azou 4 1 INRIA Rennes - Bretagne Atlantique, Rennes, France; 2 IRISA-University
More informationAn Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems
More informationGuiding Web Proxy and Server Placement for High Performance Internet Content Delivery 1
Guiding Web Proxy and Server Placement for High Performance Internet Content Delivery 1 Peter Triantafillou (contact author) Department of Computer Engineering and Informatics, University of Patras Rio
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationContent Delivery Networks. Shaxun Chen April 21, 2009
Content Delivery Networks Shaxun Chen April 21, 2009 Outline Introduction to CDN An Industry Example: Akamai A Research Example: CDN over Mobile Networks Conclusion Outline Introduction to CDN An Industry
More informationIntroduction to Dynamic Routing Protocols
CHAPTER 3 Introduction to Dynamic Routing Protocols Objectives Upon completion of this chapter, you should be able to answer the following questions: Can you describe the role of dynamic routing protocols
More informationStability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu
Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more
More informationReal-Time Analysis of CDN in an Academic Institute: A Simulation Study
Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management
More informationPer-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
More information