P2P traffic optimization

被引:12
|
作者
Zhang GuoQiang [1 ,2 ]
Tang MingDong [3 ]
Cheng SuQi [2 ,4 ]
Zhang GuoQing [2 ]
Song HaiBin [5 ]
Cao JiGuang [6 ]
Yang Jing [7 ]
机构
[1] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing 210046, Jiangsu, Peoples R China
[2] Chinese Acad Sci, Inst Comp Technol, Beijing 100190, Peoples R China
[3] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[4] Chinese Acad Sci, Grad Univ, Beijing 100190, Peoples R China
[5] Huawei Technol, Nanjing R&D Ctr, Nanjing 210012, Jiangsu, Peoples R China
[6] China Acad Telecommun Res MIIT, Beijing 100191, Peoples R China
[7] China Mobile Res Inst, Beijing 100053, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
P2P traffic localization; P2P traffic optimization; P2P cache; locality-awareness; network coding; content-centric network; NETWORK; INTERNET;
D O I
10.1007/s11432-011-4464-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Peer-to-peer (P2P) based content distribution systems have emerged as the main form for content distribution on the Internet, which can greatly reduce the distribution cost of content providers and improve the overall system scalability. However, the mismatch between the overlay and underlay networks causes large volume of redundant traffic, which intensifies the tension between P2P content providers and ISPs. Therefore, how to efficiently use network resources to reduce the traffic burden on the ISPs is crucial for the sustainable development of P2P systems. This paper surveys the state-of-art P2P traffic optimization technologies from three perspectives: P2P cache, locality-awareness and data scheduling. Technological details, comparison between these technologies and their applicabilities are presented, followed by a discussion of the issues that remain to be addressed and the direction of future content distribution research.
引用
收藏
页码:1475 / 1492
页数:18
相关论文
共 50 条
  • [1] P2P traffic optimization
    ZHANG GuoQiang 1
    2 Institute of Computing Technology
    3 School of Computer Science and Engineering
    4 Graduate University of Chinese Academy of Sciences
    5 Nanjing R&D Center
    6 China Academy of Telecommunication Research of MIIT
    7 China Mobile Research Institute
    [J]. Science China(Information Sciences), 2012, 55 (07) : 1475 - 1492
  • [2] P2P traffic optimization
    GuoQiang Zhang
    MingDong Tang
    SuQi Cheng
    GuoQing Zhang
    HaiBin Song
    JiGuang Cao
    Jing Yang
    [J]. Science China Information Sciences, 2012, 55 : 1475 - 1492
  • [3] Traffic Optimization between Clients of P2P Video System
    Shen, Haili
    Yang, Zhijun
    [J]. 2012 INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION AND COMPUTER TECHNOLOGY (ICFCCT 2012), 2012, : 280 - 286
  • [4] P2P and P2P botnet traffic classification in two stages
    Ye, Wujian
    Cho, Kyungsan
    [J]. SOFT COMPUTING, 2017, 21 (05) : 1315 - 1326
  • [5] Detecting P2P Traffic from the P2P Flow Graph
    Kim, Jonghyun
    Shah, Khushboo
    Bohacek, Stephan
    [J]. 2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 1795 - 1800
  • [6] P2P and P2P botnet traffic classification in two stages
    Wujian Ye
    Kyungsan Cho
    [J]. Soft Computing, 2017, 21 : 1315 - 1326
  • [7] A P2P traffic optimization model based on secondary cache strategy
    Chen, Hongwei
    Wang, Shuping
    Wang, Chunzhi
    Zong, Xinlu
    [J]. Journal of Computational Information Systems, 2015, 11 (03): : 1029 - 1037
  • [8] P2P Traffic Detection Based on Particle Swarm Optimization Algorithm
    Song Rong
    Li Xiating
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (12): : 155 - 164
  • [9] On the resilience of P2P botnet footprints in the presence of legitimate P2P traffic
    Daneshgar, Fateme Faraji
    Abbaspour, Maghsoud
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (13)
  • [10] The method of P2P traffic detecting for P2P harmful contents prevention
    Lee, HG
    Nam, TY
    Jang, JS
    [J]. 7th International Conference on Advanced Communication Technology, Vols 1 and 2, Proceedings, 2005, : 777 - 780