Skip to main content
Log in

On the collaboration of different peer-to-peer traffic management schemas

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

The fast-growing traffic of peer-to-peer (P2P) applications, most notably BitTorrent, is putting unprecedented pressure to Internet Service Providers (ISPs). To address this challenge, a number of P2P traffic management schemes have been proposed in recent years, among which caching and redirection are two representatives. Both of them have shown their success in theory and in practice. Yet, their implementations are largely independent, making the overall effectiveness sub-optimal. In this paper, we for the first time examine the joint implementation of these two promising solutions under a coherent framework, Tod-Cache (Traffic Orientated Distributed Caching). We show that the combination of caching and redirection can dramatically reduce the P2P traffic traversing across ISPs. Under this framework, we formulate the optimal caching and redirection problem, and show its complexity. We then present a highly adaptive and scalable heuristic algorithm which achieves close-to-optimal performance with much lower computational complexity. We extensively evaluate our framework under diverse network and end-system configurations. Our simulation results show that, under the same configuration, it can achieve at least 85 % of performance of the traditional cache with at most 1/10 of the device number.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. CacheLogic. Available: http://www.cachelogic.com/

  2. Karagiannis T, Rodriguez P, Papagiannaki K (2005) Should internet service providers fear peerassisted content distribution? In: SIGCOMM 2005

  3. Saleh O, Hefeeda M (2006) Modeling and caching of peer-to-peer traffic. In: ICNP 2006

  4. Wang L, Pai V, Peterson L (2002) The effectiveness of request redirection on cdn robustness. In: OSDI 2002

  5. Clarke EH (1971) Multipart pricing in public goods. In: PublicChoice 1971

  6. Qiu D, Srikant R (2004) Modeling and performance analysis of BitTorrent-like peer-to-peer networks. In: Proc. ACM SIGCOMM 2004

  7. Karagiannis T, Rodriguez P, Papagiannaki K (2005) Should internet service providers fear peer-assisted content Distribution? In: Proc. ACM/USENIX IMC 2005

  8. Blond SL, Legout A, Dabbous W (2008) Pushing BitTorrent locality to the limit. INRIA Technical Report 2008

  9. Xu K, Zhang M, Liu J, Qin Z, Ye M (2010) Proxy caching for peer-to-peer live streaming. Comput Networks 54(7):1229–1241

    Article  MATH  Google Scholar 

  10. Xie H, Yang RY, Krishnamurthy A, Liu YG, Silberschatz A (2008) P4p: provider portal for applications. In: Proc. ACM SIGCOMM 2008

  11. Choffnes DR, Bustamante FE (2008) Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems. In: Proc. ACM SIGCOMM 2008

  12. Bindal R, Cao P, Chan W, Medved J, Suwala G, Bates T, Zhang A (2006) Improving traffic locality in BitTorrent via biased neighbor selection. In: Proc. IEEE ICDCS 2006

  13. Dhungel P, Wu D, Liu Z, Ross K (2010) BitTorrent darknets. In: Proc. IEEE INFOCOM 2010

  14. Otto JS, Sanchez MA, Choffnes DR, Bustamante FE, Siganos G (2011) On blind mice and the elephant: understanding the network impact of a large distributed system. In: Proc. ACM SIGCOMM 2011

  15. Piatek M, Madhyastha HV, John JP, Krishnamurth A, Anderson T (2009) Pitfalls for ISP-friendly P2P design. In: Proc. ACM HOTNETS 2009

  16. Cuevas R, Laoutaris N, Yang X, Siganos G, Rodriguez P (2011) Deep diving into BitTorrent locality. In: Proc. IEEE INFOCOM 2011

  17. Leibowitz N, Ripeanu M, Wierzbicki A (2003) Deconstructing the kazaa network. In: 3rd IEEE workshop on Internet applications 2003

  18. Wierzbicki A, Leibowitz N, Ripeanu M, Wozniak R (2004) Cache replacement policies revisited: the case of P2P traffic. In: International workshop on global and peer-to-peer computing 2004

  19. Gummadi K, Dunn R, Saroiu S, Gribble S, Levy H, Zahorjan J (2003) Measurement, modelingand analysis of a peer-to-peer file-sharing workload. In: ACM symposium on operating systems principles 2003

  20. Xu K, Liu H, Liu J, Zhang J (2010) LBMP: a logarithm-barrier-based multipath protocol for internet traffic management. IEEE Trans Parallel Distrib Syst 22(3):476–488

    Article  Google Scholar 

  21. Hamada T, Chujo K, Chujo T, Yang X (2004) Peer-to-peer traffic in metro networks: analysis, modeling and policies. In: NOMS 2004

  22. Karagiannis T, Rodriguez P, Papagiannaki D (2005) Should internet service providers fear peer-assisted content distribution? In: IMC 2005

  23. Keralapura R, Taft N, Chuah CN, Iannaconne G (2004) Cans take the heat from overlay networks? In: ACM HotNets 2004

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haiyang Wang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Liu, X., Wang, H. & Zhang, L. On the collaboration of different peer-to-peer traffic management schemas. Peer-to-Peer Netw. Appl. 7, 459–468 (2014). https://doi.org/10.1007/s12083-012-0168-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-012-0168-0

Keywords

Navigation