Skip to main content
Log in

Characterisation, design and simulation of an efficient peer-to-peer content distribution system for enterprise networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

In this article, we describe the desired attributes to build a system aimed to content distribution in enterprise networks. As a result of this characterisation, we propose several additions to BitTorrent, which is currently used for personal use, so it could efficiently work with large-scale enterprise networks. The modifications are necessary to address NAT, double NAT, and firewalls that are common in enterprise environments. To deal with these problems, the protocol is augmented and also a description of the mechanisms to handle these variations is given. Simulation experiments show that results for this proposed work are much more efficient than BitTorrent since we took advantage of distinctive characteristics in these networks. By efficient, we mean: 1) decrease time to download content, 2) provide support to external hosts (other LANs), while 3) WAN bandwidth is used in the best possible manner.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Yu-Wei E, Xin S, Sanjay G, Geoffrey G (2011) Maltz, towards systematic design of enterprise networks, vol. 19. Issue 3. IEEE/ACM Transactions on Networking, USA

  2. Perez-Botero D, Szefer J (2013) Characterizing hypervisor vulnerabilities in cloud computing servers. In: Proceedings of the 2013 international workshop on Security in cloud computing

  3. Guha S, Francis P (2007) An end-middle-end approach to connection establishment. In: Proceedings of the 2007 conference on applications, technologies, architectures, and protocols for computer communications, USA

  4. Faqs.org (1994) Network address translation, [Online]. Available: http://www.faqs.org/rfcs/rfc1631.html

  5. Gkantsidis C, Karagiannis T, Rodriguez P, Vojnovic M (2006) Planet scale software updates. microsoft technical report MSR-TR-2006-85. Microsoft Research

  6. Samuel J, Mathewson N, Cappos J, Dingledine R (2010) Survivable key compromise in software update systems. In: Proceedings of the 17th ACM conference on Computer and communications security, New York

  7. Ari I, Hong B, Miller EL, Brandt SA (2013) Managing flash crowds on the internet. In: International symposium on modeling, analysis and simulation of computer telecommunications systems, Orlando

  8. Wood W (2007) A practical example of applying attribute-driven design version 2.0, Software Engineering Institute. Carnegie Mellon University

  9. Bass L (2012) Software architecture in practice, 3rd Edn. SEI

  10. Bass L, Klein M, Bachmann F (2002) Quality attribute design primitives and the attribute driven design method. Software Engineering Institute, London

  11. Ning P, Liu A, Du W (2008) Mitigating DoS attacks against broadcast authentication in wireless sensor networks, Vol. 4, No. 1. Transactions on Sensor Networks, New York

  12. Cisco: IP Addressing, [Online]. Available: http://www.cisco.com/warp/public/701/3.html

  13. Eger K, Hobfeld T, Binzenhofer A, Kunzmann G (2007) Efficient simulation of large-scale p2p networks: packet-level vs. flow-level simulations. Proceedings of the second workshop on use of P2P, USA

  14. Khalid T (2010) Measurement of software requirements derived from system reliability requirements. In: Proceedings of the workshop on advances in functional size measurement and effort estimation, USA

  15. Naicken B, Livingston A, Basu S, Rodhetbhai I, Wakeman D (2007) The state of peer-to-peer simulators and simulations, vol. 37, no. 2. ACM SIGCOMM Computer Communication Review, USA

  16. Liu H, Jia X, Li D, Lee C (2004) Optimal placement of mirrored web servers in ring networks. Communications. IEE Proceedings vol. 151, no. 2

  17. Nygren E (2010) The Akamai network: a platform for high-performance internet applications. ACM SIGOPS Operating Systems Review

  18. Microsoft: Server security patch management at microsoft. Technical white paper. 2004, http://www.microsoft.com/en-ph/download/details.aspx?id=16730

  19. Vojnovic M, Ganesh A (2003) On the race of worms, alerts, and patches, vol. PP, no. 99. IEEE/ACM Transactions on Networking

  20. Singh A, Ngan T, Druschel P, Wallach D (2006) Eclipse attacks on overlay networks: threats and defenses. INFOCOM, Barcelona

  21. Padmanabhan V, Sripanidkulchai K (2002) The case for cooperative networking. IPTPS

  22. Saroiu S, Khrisna P (2006) A measurement study of peer-to-peer file sharing systems. Dept. of Computer Science and Engineering. University of Washington, USA

  23. Liao W, Papadopoulos F, Psounis K, Psomas C (2013) Modeling BitTorrent-like systems with many classes of users. TOMACS 23(2)

  24. Perkins C, Luo K (1995) Using DHCP with computers that move, vol. 1, no. 3. Wireless Networks, USA

  25. Adar E, Huberman B (2000) Free riding on gnutella. First Monday 5(10)

  26. Gkantsidis C, Miller J, Rodriguez P (2006) Comprehensive view of a live network coding P2P system. Association for Computing Machinery

  27. Aguilar A, Ege E (2007) Enabling peer cooperation in private local area networks using BitTorrent. IEEE Symposium on Computers and Communications, Portugal

  28. Kasera S, Kurose J, Towsley D (1997) Scalable reliable multicast using multiple multicast groups. Proceedings of ACM SIGMETRICS97, Seattle

  29. Lao L, Cui J, Gerla M (2005) TOMA: a viable solution for large-scale multicast service support. In: Proceedings of IFIP Networking

  30. Jannotti J, Gifford D, Johnson KL (2000) Overcast: reliable multicasting with an overlay network. In: Proceedings of USENIX symposium on operating systems design and implementation

  31. Chang B, Shi Y, Zhang N (2006) HyMoNet: a peer-to-peer hybrid multicast overlay network for efficient live media streaming. In: Proceedings of the 20th international conference on advanced information networking and applications

  32. Vellore P, Gillard P, Venkatesan R (2009) Performance analysis of BitTorrent enabled ad hoc network routing. In: Proceedings of the 2009 international conference on wireless communications and mobile computing

  33. BitTorrent Protocol Specification. http://www.bittorrent.org (2012)

  34. Yang XY, Hernandez P, Souza L, Ripoll A, Suppi R, Luque E, Cores F (2006) Multi-collaboration domain multicast P2P delivery architecture for VoD system. In: IEEE International Conference on Communications

  35. Amad M, Haddad Z, Khenous L, Kabyl K A scalable based multicast model for P2P Conferencing applications. Ultra Modern

  36. Qiu D, Srikant R (2004) Modeling and performance analysis of bittorrent-like peer-to-peer networks. In: Proceedings of ACM Sigcomm, Portland

  37. Rodriguez-Dagnino R, Bustos-Gardea R (1998) Beta-binomial video traffic modeling for the knockout ATM multicasting switch. In: Proceedings of SPIE, vol 3531

  38. Telecommunications Workshops (2009) Teo Wei Ling Michelle, A BitTorrent implementation and simulation, Department of Computer Science, National University of Singapore, 2007

  39. Microsoft corporation, BitTorrent simulator, microsoft research (2010), http://research.microsoft.com/en-us/downloads/20d68689-9a8d-44c0-80cd-66dfa4b0504b/

  40. This is how BitTorrent Works, http://www.javipas.com/2006/09/19/asi-funciona-bittorrent/ (2013)

  41. BitTorrent Simulator: How and Why BitTorrent works, http://torrentfreak.com/bittorrent-simulator-how-and-why-bittorrent-works/ (2006)

  42. Graphical BitTorrent simulator, http://weblogs.asp.net/jgalloway/archive/2005/03/15/394639.aspx (2009)

  43. Eger K, Hobfeld T, Binzenhofer A, Kunzmann G (2006) Efficient simulation of large-scale p2p networks: packet-level vs. flow-level simulations. In: Proceedings of the second work- shop on Use of P2P, GRID and agents for the development of content networks. ACM Digital Library

  44. Mondal A, Kitsuregawa M (2006) Privacy, security and trust in P2P environments: a perspective. DEXA

  45. Mokbel MF (2006) Challenges in preserving location privacy in peer-to-peer environments. In: Seventh international conference on web-age information management workshops

  46. Gheorghe G, Cigno R, Montresor A (2011) Security and privacy issues in P2P streaming systems: a survey. Peer-to-Peer Networking and Applications 4(2):75–91

    Article  Google Scholar 

  47. Belenkiy M, Chase M, Erway CC (2007) Making P2P accountable without losing privacy. In: Proceedings of the 2007 ACM workshop on Privacy in electronic society

  48. Beckers K, Fabender S (2012) Supporting the development and documentation of ISO 27001 information security management systems through security requirements engineering approaches. In: ESSoS’12 Proceedings of the 4th international conference on engineering secure software and systems. Springer, Berlin, pp 14–21

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alberto Aguilar-Gonzalez.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Aguilar-Gonzalez, A., Nolazco-Flores, J.A., Vargas-Rosales, C. et al. Characterisation, design and simulation of an efficient peer-to-peer content distribution system for enterprise networks. Peer-to-Peer Netw. Appl. 10, 122–137 (2017). https://doi.org/10.1007/s12083-015-0412-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-015-0412-5

Keywords

Navigation