Bounding peer-to-peer upload traffic in client networks

被引:0
|
作者
Huang, Chun-Ying [1 ]
Lei, Chin-Laung [2 ]
机构
[1] Natl Taiwan Univ, Taipei, Taiwan
[2] Natl Taiwan Univ, Taipei, Taiwan
关键词
D O I
10.1109/DSN.2007.24
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Peer-to-peer technique has now become one of the major techniques to exchange digital content between peers of the same interest. However as the amount of peer-to-peer traffic increases, a network administrator would like to control the network resources consumed by peer-to-peer applications. Due to the use of random ports and protocol encryption, it is hard to identify and apply proper control policies to peer-to-peer traffic. How do we properly bound the peer-to-peer traffic and prevent it from consuming all the available network resources? In this paper, we propose an algorithm that tries to approximately bound the network resources consumed by peer-to-peer traffic without examining packet payloads. Our methodology especially focuses on upload traffic for that the upload bandwidth for an ISP are usually more precious than download bandwidth. The method is constructed in two stages. First, we observe several traffic characteristics of peer-to-peer applications and traditional client-server based Internet services. We also observe the generic traffic properties in a client network. Then, based on the symmetry of network traffic in both temporal and spatial domains, we propose to use a bitmap filter to bound the network resources consumed by peer-to-peer applications. The proposed algorithm takes only constant storage and computation time. The evaluation also shows that with a small amount of memory, the peer-to-peer traffic can be properly bounded close to a predefined amount.
引用
收藏
页码:759 / +
页数:2
相关论文
共 50 条
  • [31] Analyzing peer-to-peer traffic's impact on large scale networks
    Yang, Mao
    Dai, Yafei
    Tian, Jing
    COMPUTATIONAL SCIENCE - ICCS 2006, PT 4, PROCEEDINGS, 2006, 3994 : 412 - 419
  • [32] Peer-to-Peer Networks 2
    Lin Yu 1
    2. Peking University
    ZTE Communications, 2006, (02) : 61 - 64
  • [33] Butterflies and peer-to-peer networks
    Datar, M
    ALGORITHMS-ESA 2002, PROCEEDINGS, 2002, 2461 : 310 - 322
  • [34] COOPERATION IN PEER-TO-PEER NETWORKS
    Gradowski, Tomasz
    Mrowinski, Maciej J.
    Kosinski, Robert A.
    ACTA PHYSICA POLONICA B, 2010, 41 (05): : 1143 - 1149
  • [35] Tracerouting peer-to-peer networks
    Liu, WL
    Boutaba, R
    Monitoring Internet Traffic and Services, 2005, : 101 - 114
  • [36] Searching in peer-to-peer networks
    Klampanos, Iraklis A.
    Jose, Joemon M.
    COMPUTER SCIENCE REVIEW, 2012, 6 (04) : 161 - 183
  • [37] Simulating Peer-to-Peer Networks
    Dhurandher, Sanjay K.
    Misra, Sudip
    Obaidat, Mohammad S.
    Singh, Inderpreet
    Agarwal, Raghu
    Bhambhani, Bhuvnesh
    2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 336 - +
  • [38] Peer-to-Peer Accommodation Networks
    Pappas, Nikolaos
    TOURISM MANAGEMENT, 2019, 74 : 425 - 425
  • [39] Reputation in peer-to-peer networks
    Hu, THT
    Wongrujira, K
    Sereviratne, A
    2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 1411 - 1415
  • [40] JXTA & peer-to-peer networks
    Li, S
    DR DOBBS JOURNAL, 2003, 28 (06): : 30 - +