Estimating and Controlling the Traffic Impact of a Collaborative P2P System
Nowadays, P2P applications are commonly used in the Internet being an important paradigm for the development of distinct services. However, the dissemination of P2P applications also entails some important challenges that should be carefully addressed. In particular, some of the important coexistence problems existing between P2P applications and Internet Service Providers (ISPs) are mainly motivated by the inherent P2P dynamics which cause traffic to scatter across the network links in an unforeseeable way.
In this context, this work proposes a collaborative framework of a BitTorrent like system. Using the proposed framework and based on the exchange of valuable information between the application and network levels, some novel techniques are proposed allowing to estimate and control the traffic impact that the P2P system will have on the links of the underlying network infrastructure. Both the framework and the presented techniques were tested resorting to simulation. The results clearly corroborate the viability and effectiveness of the formulated methods.
KeywordsP2P Traffic Engineering BitTorrent Collaborative systems
Unable to display preview. Download preview PDF.
- 2.Choen, B.: Incentives build robustness in BitTorrent. In: Proceedings 1st Workshop on Economics of Peer-to-Peer Systems, Berkeley (June 2003)Google Scholar
- 3.Karagiannis, T., et al.: Is p2p dying or just hiding? In: Proceedings of GLOBECOM, Dallas, USA (November 2004)Google Scholar
- 4.Schulze, H., Mochalski, K.: Internet Study 2007: The Impact of P2P File Sharing, Voice over IP, Skype, Joost, Instant Messaging, One-Click Hosting and Media Streaming such as YouTube on the Internet. Technical Report (2007)Google Scholar
- 5.Xie, H., Krishnamurthy, A., Silberschatz, A., Yang, Y.R.: P4P: explicit communications for cooperative control between P2P and network providers (2008), http://www.dcia.info/documents/P4P_Overview.pdf
- 6.Seetharaman, S., Ammar, M.: Characterizing and mitigating inter-domain policy violations in overlay routes. In: Proceedings of IEEE International Conference on Network Protocols, ICNP (2006)Google Scholar
- 7.Keralapura, R., Taft, N., Chuah, C., Iannaccone, G.: Can ISPs take the heat from overlay networks? In: Proceedings of HotNets-III, San Diego, CA (November 2004)Google Scholar
- 8.Qiu, L., Yang, Y.R., Zhang, Y., Shenker, S.: On selfish routing in Internet-like environments. In: Proceedings of SIGCOMM, Karlsruhe, Germany (August 2003)Google Scholar
- 9.Xie, H., et al.: P4P: Provider Portal for Applications. In: Proceedings of ACM SIGCOMM 2008, Seattle, Washington, USA, August 17-22 (2008)Google Scholar
- 11.Legout, A., et al.: Clustering and Sharing Incentives in BitTorrent Systems. In: Proceedings of ACM SIGMETRICS 2007, San Diego, USA, June 12-16 (2007)Google Scholar
- 12.Sousa, P.: Flexible Peer Selection Mechanisms for Future Internet Applications. In: Proceedings of BROADNETS 2009 - Sixth International ICST Conference on Broadband Communications, Networks and Systems, Madrid, Spain (2009)Google Scholar
- 14.Narayanan, S.: The betweenness centrality of biological networks. MSc Thesis, Faculty of the Virginia Polytechnic Institute and State University (2005)Google Scholar
- 15.Rocha, M., Sousa, P., Rio, M., Cortez, P.: QoS constrained internet routing with evolutionary algorithms. In: Proceedings of IEEE Congress on Evolutionary Computation, pp. 2720–2727 (2006)Google Scholar
- 17.ns-2 (The Network Simulator). Sources and Documentation, http://www.isi.edu/nsnam/ns/
- 18.Eger, K., Hoßfeld, T., Binzenhofer, A., Kunzmann, G.: Efficient Simulation of Large-Scale P2P Networks: Packet-level vs. Flow-level Simulations. In: Proceedings of 2nd Workshop on the Use of P2P, GRID and Agents for the Development of Content Networks (2007)Google Scholar