Peer-to-peer traffic measurement, analysis and management in an institutional network

被引:0
|
作者
Guirado-Puerta, AM [1 ]
Malgosa-Sanahuja, J [1 ]
García-Haro, J [1 ]
Manzanares-López, P [1 ]
Sánchez-Aarnoutse, JC [1 ]
机构
[1] Polytech Univ Cartagena, Dept Informat Technol & Commun, E-30202 Cartagena, Spain
关键词
peer to peer; measurement and analysis; network management technologies and protocol identification;
D O I
10.1109/IPOM.2004.1547612
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Peer-to-peer (P2P) file-sharing applications are drastically changing the role of the Internet Service Providers (ISP) and institutional networks. This key reason is an unexpected and indiscriminate network bandwidth use that breaks the balance between costs and benefits. In addition, legal issues must be considered due to piracy associated with P2P applications. P2P effects are especially harmful in corporate, institutional and government networks that do not want to assume the responsibility to carry this type of data traffic. This paper presents an extensive analysis of eDonkey protocol that is one of the most popular P2P protocols. The analysis is focused on studying those important characteristics that allow understanding its behavior. A methodology to identify efficiently the associated TCP flows is also proposed. As a result, a mechanism based on spoofing TCP Reset packets is tested to mitigate the eDonkey traffic effects and alleviate the network load.
引用
收藏
页码:170 / 175
页数:6
相关论文
共 50 条
  • [31] Early Identification of Peer-To-Peer Traffic
    Hullar, Bela
    Laki, Sandor
    Gyoergy, Andras
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [32] Modeling and caching of peer-to-peer traffic
    Saleh, Osama
    Hefeeda, Mohamed
    [J]. PROCEEDINGS OF THE 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, 2006, : 243 - +
  • [33] TELETRAFFIC MODELING OF PEER-TO-PEER TRAFFIC
    Eittenberger, Philipp M.
    Krieger, Udo R.
    Markovich, Natalia M.
    [J]. 2012 WINTER SIMULATION CONFERENCE (WSC), 2012,
  • [34] On Characterizing Peer-to-Peer Streaming Traffic
    Yang, Jie
    Yuan, Lun
    Dong, Chao
    Cheng, Gang
    Ansari, Nirwan
    Kato, Nei
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) : 175 - 188
  • [35] Peer-to-Peer Traffic in Operator Networks
    Damola, Ayodele
    Souza, Victor
    Karlsson, Per
    Green, Howard
    [J]. P2P'08: EIGHTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2008, : 177 - 179
  • [36] Peer-To-Peer Traffic Visual Detection
    Yu FuXing
    Wu YaFeng
    Suo YiNa
    Su YaGuang
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS I AND II, 2009, : 45 - 48
  • [37] Selection of on-line features for peer-to-peer network traffic classification
    [J]. Jamil, Haitham A. (haitham.jamil@fkegraduate.utm.my), 1600, Springer Verlag (235):
  • [38] Practicable network design for handling growth in the volume of peer-to-peer traffic
    Kamei, S
    Kimura, T
    [J]. 2003 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2003, : 597 - 600
  • [39] Peer-to-peer traffic in metro networks: Analysis, modeling, and policies
    Hamada, T
    Chujo, K
    Chujo, T
    Yang, X
    [J]. NOMS 2004: IEEE/IFIP NETWORK OPERATIONS AND MANAGMENT SYMPOSIUM: MANAGING NEXT GENERATION CONVERGENCE NETWORKS AND SERVICES, 2004, : 425 - 438
  • [40] Application-layer traffic analysis of a peer-to-peer system
    Tutsch, Dietmar
    Babin, Gilbert
    Kropf, Peter
    [J]. IEEE INTERNET COMPUTING, 2008, 12 (05) : 70 - 77