Bounding peer-to-peer upload traffic in client networks

被引:0
|
作者
Huang, Chun-Ying [1 ]
Lei, Chin-Laung [2 ]
机构
[1] Natl Taiwan Univ, Taipei, Taiwan
[2] Natl Taiwan Univ, Taipei, Taiwan
关键词
D O I
10.1109/DSN.2007.24
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Peer-to-peer technique has now become one of the major techniques to exchange digital content between peers of the same interest. However as the amount of peer-to-peer traffic increases, a network administrator would like to control the network resources consumed by peer-to-peer applications. Due to the use of random ports and protocol encryption, it is hard to identify and apply proper control policies to peer-to-peer traffic. How do we properly bound the peer-to-peer traffic and prevent it from consuming all the available network resources? In this paper, we propose an algorithm that tries to approximately bound the network resources consumed by peer-to-peer traffic without examining packet payloads. Our methodology especially focuses on upload traffic for that the upload bandwidth for an ISP are usually more precious than download bandwidth. The method is constructed in two stages. First, we observe several traffic characteristics of peer-to-peer applications and traditional client-server based Internet services. We also observe the generic traffic properties in a client network. Then, based on the symmetry of network traffic in both temporal and spatial domains, we propose to use a bitmap filter to bound the network resources consumed by peer-to-peer applications. The proposed algorithm takes only constant storage and computation time. The evaluation also shows that with a small amount of memory, the peer-to-peer traffic can be properly bounded close to a predefined amount.
引用
收藏
页码:759 / +
页数:2
相关论文
共 50 条
  • [11] Peer-to-peer traffic in metro networks: Analysis, modeling, and policies
    Hamada, T
    Chujo, K
    Chujo, T
    Yang, X
    NOMS 2004: IEEE/IFIP NETWORK OPERATIONS AND MANAGMENT SYMPOSIUM: MANAGING NEXT GENERATION CONVERGENCE NETWORKS AND SERVICES, 2004, : 425 - 438
  • [12] Peer-to-Peer Networks
    Lin Yu1
    2. Peking University
    ZTECommunications, 2006, (01) : 53 - 57
  • [13] Performance evaluation of traffic management mechanisms for Peer-to-Peer networks
    Wojcik, Robert
    Domzal, Jerzy
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2016, 70 (02) : 162 - 171
  • [14] Peer-to-peer networks
    Fox, G
    COMPUTING IN SCIENCE & ENGINEERING, 2001, 3 (03) : 75 - 77
  • [15] A Dynamic Peer-to-Peer Traffic Limiting Policy for ISP Networks
    Wang, Chaojiong
    Wang, Ning
    Howarth, Michael
    Pavlou, George
    PROCEEDINGS OF THE 2010 IEEE-IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2010, : 317 - 324
  • [16] On Peer-to-Peer client web cache sharing
    Liu, JC
    Chu, XW
    Xu, K
    ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 306 - 310
  • [17] A client peer adjustment policy for peer-to-peer media streaming
    Chen, Gang
    Wu, Guo-xin
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 98 - +
  • [18] An Upload Bandwidth Threshold for Peer-to-Peer Video-on-Demand Scalability
    Boufkhad, Yacine
    Mathieu, Fabien
    de Montgolfier, Fabien
    Perino, Diego
    Viennot, Laurent
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL & DISTRIBUTED PROCESSING, VOLS 1-5, 2009, : 726 - +
  • [19] A Study on Upload Capacity Utilization with Minimum Delay in Peer-to-Peer Streaming
    Kim, Geun-Hyung
    SMART SPACES AND NEXT GENERATION WIRED/WIRELESS NETWORKING, 2011, 6869 : 508 - 519
  • [20] A Peer-To-Peer Traffic Identification Method
    Tan Man-tang
    Zhang Li
    2011 3RD WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING (ACC 2011), VOL 4, 2011, 4 : 266 - +