Abstract
In this article, we describe the desired attributes to build a system aimed to content distribution in enterprise networks. As a result of this characterisation, we propose several additions to BitTorrent, which is currently used for personal use, so it could efficiently work with large-scale enterprise networks. The modifications are necessary to address NAT, double NAT, and firewalls that are common in enterprise environments. To deal with these problems, the protocol is augmented and also a description of the mechanisms to handle these variations is given. Simulation experiments show that results for this proposed work are much more efficient than BitTorrent since we took advantage of distinctive characteristics in these networks. By efficient, we mean: 1) decrease time to download content, 2) provide support to external hosts (other LANs), while 3) WAN bandwidth is used in the best possible manner.
Similar content being viewed by others
References
Yu-Wei E, Xin S, Sanjay G, Geoffrey G (2011) Maltz, towards systematic design of enterprise networks, vol. 19. Issue 3. IEEE/ACM Transactions on Networking, USA
Perez-Botero D, Szefer J (2013) Characterizing hypervisor vulnerabilities in cloud computing servers. In: Proceedings of the 2013 international workshop on Security in cloud computing
Guha S, Francis P (2007) An end-middle-end approach to connection establishment. In: Proceedings of the 2007 conference on applications, technologies, architectures, and protocols for computer communications, USA
Faqs.org (1994) Network address translation, [Online]. Available: http://www.faqs.org/rfcs/rfc1631.html
Gkantsidis C, Karagiannis T, Rodriguez P, Vojnovic M (2006) Planet scale software updates. microsoft technical report MSR-TR-2006-85. Microsoft Research
Samuel J, Mathewson N, Cappos J, Dingledine R (2010) Survivable key compromise in software update systems. In: Proceedings of the 17th ACM conference on Computer and communications security, New York
Ari I, Hong B, Miller EL, Brandt SA (2013) Managing flash crowds on the internet. In: International symposium on modeling, analysis and simulation of computer telecommunications systems, Orlando
Wood W (2007) A practical example of applying attribute-driven design version 2.0, Software Engineering Institute. Carnegie Mellon University
Bass L (2012) Software architecture in practice, 3rd Edn. SEI
Bass L, Klein M, Bachmann F (2002) Quality attribute design primitives and the attribute driven design method. Software Engineering Institute, London
Ning P, Liu A, Du W (2008) Mitigating DoS attacks against broadcast authentication in wireless sensor networks, Vol. 4, No. 1. Transactions on Sensor Networks, New York
Cisco: IP Addressing, [Online]. Available: http://www.cisco.com/warp/public/701/3.html
Eger K, Hobfeld T, Binzenhofer A, Kunzmann G (2007) Efficient simulation of large-scale p2p networks: packet-level vs. flow-level simulations. Proceedings of the second workshop on use of P2P, USA
Khalid T (2010) Measurement of software requirements derived from system reliability requirements. In: Proceedings of the workshop on advances in functional size measurement and effort estimation, USA
Naicken B, Livingston A, Basu S, Rodhetbhai I, Wakeman D (2007) The state of peer-to-peer simulators and simulations, vol. 37, no. 2. ACM SIGCOMM Computer Communication Review, USA
Liu H, Jia X, Li D, Lee C (2004) Optimal placement of mirrored web servers in ring networks. Communications. IEE Proceedings vol. 151, no. 2
Nygren E (2010) The Akamai network: a platform for high-performance internet applications. ACM SIGOPS Operating Systems Review
Microsoft: Server security patch management at microsoft. Technical white paper. 2004, http://www.microsoft.com/en-ph/download/details.aspx?id=16730
Vojnovic M, Ganesh A (2003) On the race of worms, alerts, and patches, vol. PP, no. 99. IEEE/ACM Transactions on Networking
Singh A, Ngan T, Druschel P, Wallach D (2006) Eclipse attacks on overlay networks: threats and defenses. INFOCOM, Barcelona
Padmanabhan V, Sripanidkulchai K (2002) The case for cooperative networking. IPTPS
Saroiu S, Khrisna P (2006) A measurement study of peer-to-peer file sharing systems. Dept. of Computer Science and Engineering. University of Washington, USA
Liao W, Papadopoulos F, Psounis K, Psomas C (2013) Modeling BitTorrent-like systems with many classes of users. TOMACS 23(2)
Perkins C, Luo K (1995) Using DHCP with computers that move, vol. 1, no. 3. Wireless Networks, USA
Adar E, Huberman B (2000) Free riding on gnutella. First Monday 5(10)
Gkantsidis C, Miller J, Rodriguez P (2006) Comprehensive view of a live network coding P2P system. Association for Computing Machinery
Aguilar A, Ege E (2007) Enabling peer cooperation in private local area networks using BitTorrent. IEEE Symposium on Computers and Communications, Portugal
Kasera S, Kurose J, Towsley D (1997) Scalable reliable multicast using multiple multicast groups. Proceedings of ACM SIGMETRICS97, Seattle
Lao L, Cui J, Gerla M (2005) TOMA: a viable solution for large-scale multicast service support. In: Proceedings of IFIP Networking
Jannotti J, Gifford D, Johnson KL (2000) Overcast: reliable multicasting with an overlay network. In: Proceedings of USENIX symposium on operating systems design and implementation
Chang B, Shi Y, Zhang N (2006) HyMoNet: a peer-to-peer hybrid multicast overlay network for efficient live media streaming. In: Proceedings of the 20th international conference on advanced information networking and applications
Vellore P, Gillard P, Venkatesan R (2009) Performance analysis of BitTorrent enabled ad hoc network routing. In: Proceedings of the 2009 international conference on wireless communications and mobile computing
BitTorrent Protocol Specification. http://www.bittorrent.org (2012)
Yang XY, Hernandez P, Souza L, Ripoll A, Suppi R, Luque E, Cores F (2006) Multi-collaboration domain multicast P2P delivery architecture for VoD system. In: IEEE International Conference on Communications
Amad M, Haddad Z, Khenous L, Kabyl K A scalable based multicast model for P2P Conferencing applications. Ultra Modern
Qiu D, Srikant R (2004) Modeling and performance analysis of bittorrent-like peer-to-peer networks. In: Proceedings of ACM Sigcomm, Portland
Rodriguez-Dagnino R, Bustos-Gardea R (1998) Beta-binomial video traffic modeling for the knockout ATM multicasting switch. In: Proceedings of SPIE, vol 3531
Telecommunications Workshops (2009) Teo Wei Ling Michelle, A BitTorrent implementation and simulation, Department of Computer Science, National University of Singapore, 2007
Microsoft corporation, BitTorrent simulator, microsoft research (2010), http://research.microsoft.com/en-us/downloads/20d68689-9a8d-44c0-80cd-66dfa4b0504b/
This is how BitTorrent Works, http://www.javipas.com/2006/09/19/asi-funciona-bittorrent/ (2013)
BitTorrent Simulator: How and Why BitTorrent works, http://torrentfreak.com/bittorrent-simulator-how-and-why-bittorrent-works/ (2006)
Graphical BitTorrent simulator, http://weblogs.asp.net/jgalloway/archive/2005/03/15/394639.aspx (2009)
Eger K, Hobfeld T, Binzenhofer A, Kunzmann G (2006) Efficient simulation of large-scale p2p networks: packet-level vs. flow-level simulations. In: Proceedings of the second work- shop on Use of P2P, GRID and agents for the development of content networks. ACM Digital Library
Mondal A, Kitsuregawa M (2006) Privacy, security and trust in P2P environments: a perspective. DEXA
Mokbel MF (2006) Challenges in preserving location privacy in peer-to-peer environments. In: Seventh international conference on web-age information management workshops
Gheorghe G, Cigno R, Montresor A (2011) Security and privacy issues in P2P streaming systems: a survey. Peer-to-Peer Networking and Applications 4(2):75–91
Belenkiy M, Chase M, Erway CC (2007) Making P2P accountable without losing privacy. In: Proceedings of the 2007 ACM workshop on Privacy in electronic society
Beckers K, Fabender S (2012) Supporting the development and documentation of ISO 27001 information security management systems through security requirements engineering approaches. In: ESSoS’12 Proceedings of the 4th international conference on engineering secure software and systems. Springer, Berlin, pp 14–21
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Aguilar-Gonzalez, A., Nolazco-Flores, J.A., Vargas-Rosales, C. et al. Characterisation, design and simulation of an efficient peer-to-peer content distribution system for enterprise networks. Peer-to-Peer Netw. Appl. 10, 122–137 (2017). https://doi.org/10.1007/s12083-015-0412-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-015-0412-5