A study on key strategies in P2P file sharing systems and ISPs’ P2P traffic management

The flourish of P2P systems draws a lot of attention of networking researchers. Some research efforts focus on P2P systems, trying to understand the mechanism of various implementations and the behavior pattern of P2P users, and then improve the systems’ performance. Others look at the issue from the angle of ISPs, trying to help ISPs solve various issues brought by P2P applications. In this article, we conduct a review study on recent research efforts in these two areas. The first part of this article focuses on several key strategies that have significant influence on the performance of P2P systems. In the second part, we review some important techniques for ISPs to manage P2P traffic, i.e., blocking, caching and localization, and compare their advantages and disadvantages.

[1]  Andrew W. Moore,et al.  Internet traffic classification using bayesian analysis techniques , 2005, SIGMETRICS '05.

[2]  Matthew Roughan,et al.  Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification , 2004, IMC '04.

[3]  M LevyHenry,et al.  Measurement, modeling, and analysis of a peer-to-peer file-sharing workload , 2003 .

[4]  Martin Stiemerling,et al.  Traffic localization for P2P-applications: The ALTO approach , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.

[5]  E BustamanteFabián,et al.  Taming the torrent , 2008 .

[6]  John C. S. Lui,et al.  A Simple Model for Analyzing P2P Streaming Protocols , 2007, 2007 IEEE International Conference on Network Protocols.

[7]  Fabián E. Bustamante,et al.  Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems , 2008, SIGCOMM '08.

[8]  Simon Oechsner,et al.  Pushing the performance of Biased Neighbor Selection through Biased Unchoking , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.

[9]  Christos Gkantsidis,et al.  Network coding for large scale content distribution , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[10]  Guillaume Urvoy-Keller,et al.  Rarest first and choke algorithms are enough , 2006, IMC '06.

[11]  Adam Wierzbicki,et al.  Cache replacement policies revisited: the case of P2P traffic , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..

[12]  Donald F. Towsley,et al.  Characterizing and Detecting Skype-Relayed Traffic , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[13]  Jon Crowcroft,et al.  A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.

[14]  Pablo Rodriguez,et al.  Should internet service providers fear peer-assisted content distribution? , 2005, IMC '05.

[15]  Victor O. K. Li,et al.  Performance comparison of scheduling algorithms for peer-to-peer collaborative file distribution , 2007, IEEE Journal on Selected Areas in Communications.

[16]  John C. S. Lui,et al.  A game-theoretic analysis of the implications of overlay network traffic on ISP peering , 2008, Comput. Networks.

[17]  Laurent Mathy,et al.  Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference , 2009, IMC 2009.

[18]  Jason Nieh,et al.  FairTorrent: bringing fairness to peer-to-peer systems , 2009, CoNEXT '09.

[19]  George D. Stamoulis,et al.  Improvement of BitTorrent Performance and Inter-domain Traffic by Inserting ISP-Owned Peers , 2009, ICQT.

[20]  Ke Xu,et al.  Caching the P2P Traffic in ISP Network , 2008, 2008 IEEE International Conference on Communications.

[21]  Vijay K. Gurbani,et al.  A survey of research on the application-layer traffic optimization problem and the need for layer cooperation , 2009, IEEE Communications Magazine.

[22]  Diomidis Spinellis,et al.  A survey of peer-to-peer content distribution technologies , 2004, CSUR.

[23]  Venkata N. Padmanabhan,et al.  Analyzing and Improving a BitTorrent Networks Performance Mechanisms , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[24]  Danny Bickson,et al.  The eMule Protocol Specification , 2005 .

[25]  W.-J. Tzeng,et al.  A Resource-Efficient Traffic Localization Scheme for Multiple BitTorrents , 2009, 2009 IEEE International Conference on Communications.

[26]  Marcel Dischinger,et al.  Detecting bittorrent blocking , 2008, IMC '08.

[27]  Maurizio Dusi,et al.  Traffic classification through simple statistical fingerprinting , 2007, CCRV.

[28]  Paul Francis,et al.  On the difficulty of finding the nearest peer in p2p systems , 2008, IMC '08.

[29]  Abraham Silberschatz,et al.  P4p: provider portal for applications , 2008, SIGCOMM '08.

[30]  Michalis Faloutsos,et al.  BiToS: Enhancing BitTorrent for Supporting Streaming Applications , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[31]  P. Salvador,et al.  Identification of Peer-to-Peer Applications' Flow Patterns , 2008, 2008 Next Generation Internet Networks.

[32]  Mustaque Ahamad,et al.  Incentives in BitTorrent induce free riding , 2005, P2PECON '05.

[33]  Nathaniel Leibowitz,et al.  ARE FILE SWAPPING NETWORKS CACHEABLE? CHARACTERIZING P2P TRAFFIC , 2002 .

[34]  A. Tagami,et al.  Analysis and application of passive peer influence on peer-to-peer inter-domain traffic , 2004 .

[35]  Panayiotis Mavrommatis,et al.  Identifying Known and Unknown Peer-to-Peer Traffic , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).

[36]  Krishna P. Gummadi,et al.  Measurement, modeling, and analysis of a peer-to-peer file-sharing workload , 2003, SOSP '03.

[37]  Oliver Spatscheck,et al.  Accurate, scalable in-network identification of p2p traffic using application signatures , 2004, WWW '04.

[38]  Amin Vahdat,et al.  Maintaining High-Bandwidth Under Dynamic Network Conditions , 2005, USENIX Annual Technical Conference, General Track.

[39]  John C. S. Lui,et al.  Exploring the optimal chunk selection policy for data-driven P2P streaming systems , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.

[40]  Eddie Kohler,et al.  Small is not always beautiful , 2008, IPTPS.

[41]  Michalis Faloutsos,et al.  Is P2P dying or just hiding? [P2P traffic measurement] , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[42]  Wei Li,et al.  UTAPS: An Underlying Topology-Aware Peer Selection Algorithm in BitTorrent , 2008, 22nd International Conference on Advanced Information Networking and Applications (aina 2008).

[43]  William Chan,et al.  Improving Traffic Locality in BitTorrent via Biased Neighbor Selection , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[44]  Mohamed Hefeeda,et al.  Modeling and Caching of Peer-to-Peer Traffic , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.

[45]  Christian Scheideler,et al.  Can ISPS and P2P users cooperate for improved performance? , 2007, CCRV.

[46]  Cheng Huang,et al.  Challenges, design and analysis of a large-scale p2p-vod system , 2008, SIGCOMM '08.

[47]  Takeo Hamada,et al.  Peer-to-peer traffic in metro networks: analysis, modeling, and policies , 2004, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507).