Bounding peer-to-peer upload traffic in client networks

被引:0
|
作者
Huang, Chun-Ying [1 ]
Lei, Chin-Laung [2 ]
机构
[1] Natl Taiwan Univ, Taipei, Taiwan
[2] Natl Taiwan Univ, Taipei, Taiwan
关键词
D O I
10.1109/DSN.2007.24
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Peer-to-peer technique has now become one of the major techniques to exchange digital content between peers of the same interest. However as the amount of peer-to-peer traffic increases, a network administrator would like to control the network resources consumed by peer-to-peer applications. Due to the use of random ports and protocol encryption, it is hard to identify and apply proper control policies to peer-to-peer traffic. How do we properly bound the peer-to-peer traffic and prevent it from consuming all the available network resources? In this paper, we propose an algorithm that tries to approximately bound the network resources consumed by peer-to-peer traffic without examining packet payloads. Our methodology especially focuses on upload traffic for that the upload bandwidth for an ISP are usually more precious than download bandwidth. The method is constructed in two stages. First, we observe several traffic characteristics of peer-to-peer applications and traditional client-server based Internet services. We also observe the generic traffic properties in a client network. Then, based on the symmetry of network traffic in both temporal and spatial domains, we propose to use a bitmap filter to bound the network resources consumed by peer-to-peer applications. The proposed algorithm takes only constant storage and computation time. The evaluation also shows that with a small amount of memory, the peer-to-peer traffic can be properly bounded close to a predefined amount.
引用
收藏
页码:759 / +
页数:2
相关论文
共 50 条
  • [41] JXTA & peer-to-peer networks
    Li, S
    DR DOBBS JOURNAL, 2003, 28 (06): : 30 - +
  • [42] Peer Discovery in peer-to-peer anonymity networks
    Lu, Tianbo
    Fang, Binxing
    Cheng, Xueqi
    Sun, Yuzhong
    PROCEEDINGS OF THE 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, 2006, : 131 - 136
  • [43] CLIENT/SERVER, PEER-TO-PEER NETS STAR AT CONFERENCE
    HARLER, C
    COMMUNICATIONS NEWS, 1994, 31 (05): : 46 - 47
  • [44] Extending an IMS Client with Peer-to-Peer Content Delivery
    Fiedler, J.
    Magedanz, T.
    Mueller, J.
    MOBILE WIRELESS MIDDLEWARE, OPERATING SYSTEMS, AND APPLICATIONS, 2009, 7 : 197 - +
  • [45] Classification of Peer-to-Peer traffic using incremental neural networks (Fuzzy ARTMAP)
    Raahemi, Bijan
    Kouznetsov, Alexandre
    Hayajneh, Ahmad
    Rabinovitch, Peter
    2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4, 2008, : 685 - +
  • [46] Experimental analysis of the impact of peer-to-peer applications on traffic in commercial IP networks
    Ben Azzouna, N
    Guillemin, F
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2004, 15 (06): : 511 - 522
  • [47] Identifying known and unknown peer-to-peer traffic
    Constantinou, Fivos
    Mavrommatis, Panayiotis
    NCA 2006: FIFTH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 93 - +
  • [48] Detection and Classification of Peer-to-Peer Traffic: A Survey
    Gomes, Joao V.
    Inacio, Pedro R. M.
    Pereira, Manuela
    Freire, Mario M.
    Monteiro, Paulo P.
    ACM COMPUTING SURVEYS, 2013, 45 (03)
  • [49] Integrated Measurement and Analysis of Peer-to-Peer Traffic
    Markovich, N. M.
    Biernacki, A.
    Eittenberger, P.
    Krieger, U. R.
    WIRED-WIRELESS INTERNET COMMUNICATIONS, PROCEEDINGS, 2010, 6074 : 302 - +
  • [50] Traffic analysis of peer-to-peer IPTV communities
    Silverston, Thomas
    Fourmaux, Olivier
    Botta, Alessio
    Dainotti, Alberto
    Pescape, Antonio
    Ventre, Giorgio
    Salamatian, Kave
    COMPUTER NETWORKS, 2009, 53 (04) : 470 - 484