The Community for Technology Leaders
RSS Icon
Issue No.09 - September (2010 vol.21)
pp: 1317-1329
Minghong Lin , The Chinese University of Hong Kong, Hong Kong
John C.S. Lui , The Chinese University of Hong Kong, Hong Kong
Dah-Ming Chiu , The Chinese University of Hong Kong, Hong Kong
In the past few years, P2P file distribution applications (e.g., BitTorrent) are becoming so popular that they are the dominating source of Internet traffic. This creates significant problems to Internet Service Providers (ISPs), not only because of the added complexity in traffic engineering, but the increase of traffic, in particular on the cross-ISP links, implies congestion and a higher operating cost. In this paper, we consider an ISP-friendly file distribution protocol which uses the “exploiting-the-locality principle” (ELP) to reduce the cross-ISP traffic. To show its benefit, we derive an upper and lower bound of cross-ISP traffic for the protocols which rely on ELP and show that the cross-ISP traffic can be reduced significantly when the number of peers within an ISP increases. To carry out realistic study, we design and implement our ISP-friendly protocol (which is compatible with the current BitTorrent protocol) and carry out large scale experiments on PlanetLab to measure the reduction of the cross ISP-traffic and the file downloading time. More important, we also show how the proposed ISP-friendly protocol can handle the “black-hole” security attack. This paper sheds light on the merits and design direction of ISP-friendly content distribution protocols.
File distribution protocol, ISP-friendly, BitTorrent.
Minghong Lin, John C.S. Lui, Dah-Ming Chiu, "An ISP-Friendly File Distribution Protocol: Analysis, Design, and Implementation", IEEE Transactions on Parallel & Distributed Systems, vol.21, no. 9, pp. 1317-1329, September 2010, doi:10.1109/TPDS.2009.149
[1] http://multiprobe.ewi.tudelft.nldataset.html , 2010.
[2] Bittorrent specification, http://wiki.theory.orgBitTorrent Specification , 2010.
[3] CAIDA, CoralReef suite, mentcoralreef , 2010.
[4] V. Aggarwal, O. Akonjang, and A. Feldmann, "Improving User and Isp Experience through Isp-Aided P2P Locality," Proc. IEEE Global Internet Symp., 2008.
[5] V. Aggarwal, A. Feldmann, and C. Scheideler, "Can Isps and P2P Users Cooperate for Improved Performance?" SIGCOMM Computer Comm. Rev., 2007.
[6] R. Bindal, P. Cao, W. Chan, J. Medved, G. Suwala, T. Bates, and A. Zhang, "Improving Traffic Locality in BitTorrent via Biased Neighbor Selection," Proc. IEEE Int'l Conf. Distributed Computing Systems (ICDCS), 2006.
[7] CacheLogic, Advanced solutions for peer-to-peer networks, http:/, 2010.
[8] D.R. Choffnes and F.E. Bustamante, "Taming the Torrent: A Practical Approach to Reducing Cross-Isp Traffic in Peer-to-Peer Systems," Proc. ACM SIGCOMM, 2008.
[9] B. Cohen, "Incentives Build Robustness in Bittorrent," technical report, Bittorrent.Org, 2003.
[10] B. Fan, D.M. Chiu, and J.C.S. Lui, "The Delicate Tradeoffs in Bittorrent-Like File Sharing Protocol Design," Proc. IEEE Int'l Conf. Network Protocols (ICNP), 2006.
[11] B. Fan, J.C.S. Lui, and D.-M. Chiu, "The Design Trade Offs of BitTorrent-Like File Sharing Protocols," IEEE/ACM Trans. Networking, vol. 17, no. 2, pp. 365-376, Nov. 2009.
[12] M. Izal, G. Urvoy-Keller, E.E. Biersack, P. Felber, A.A. Hamra, and L. Garces-Erice, "Dissecting BitTorrent: Five Months in a Torrent's Lifetime," Proc. Passive and Active Measurements Conf. (PAM), Apr. 2004.
[13] T. Karagiannis, P. Rodriguez, and K. Papagiannaki, "Should Internet Service Providers Fear Peer-Assisted Content Distribution?" Proc. ACM Internet Measurement Conf. (IMC), 2005.
[14] L. Kleinrock, Queueing Systems. Vol. 1: Theory. John Wiley & Sons, 1975.
[15] A. Legout, G. Urvoy-Keller, and P. Michiardi, "Rarest First and Choke Algorithms are Enough," Proc. ACM Internet Measurement Conf. (IMC), 2006.
[16] M. Lin, B. Fan, J.C.S. Lui, and D.M. Chiu, "Stochastic Analysis of File Swarming Systems," Proc. IFIP WG 7.3 Performance Conf., 2007.
[17] M. Lin, B. Fan, J.C.S. Lui, and D.-M. Chiu, "Stochastic Analysis of File-Swarming Systems," Performance Evaluation, vol. 64, nos. 9-12, pp. 856-875, 2007.
[18] R.T.B. Ma, S.C.M. Lee, J.C.S. Lui, and D.K.Y. Yau, "Incentive and Service Differentiation in P2P Networks: A Game Theoretic Approach," IEEE/ACM Trans. Networking, vol. 14, no. 5, pp. 978-991, Oct. 2006.
[19] P. Marciniak, N. Liogkas, A. Legout, and E. Kohler, "Small is not Always Beautiful," Proc. Int'l Workshop Peer-to Peer Systems (IPTPS), 2008.
[20] L. Massoulie and M. Vojnovic, "Coupon Replication Systems," Proc. ACM SIGMETRICS, 2005.
[21] J. Mundinger, R. Weber, and G. Weiss, "Optimal Scheduling of Peer-to-Peer File Dissemination," J. Scheduling, vol. 11, no. 2, pp. 105-120, 2007.
[22] J.A. Pouwelse, P. Garbacki, D.H.J. Epema, and H.J. Sips, "The BitTorrent P2P File-Sharing System: Measurements and Analysis," Proc. Fourth Int'l Workshop Peer-to-Peer Systems, 2005.
[23] D. Qiu and R. Srikant, "Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks," Proc. ACM SIGCOMM, 2004.
[24] J.H. Wang, D.-M. Chiu, and J.C.S. Lui, "A Game-Theoretic Analysis of the Implications of Overlay Network Traffic on Isp Peering," Computer Networks, vol. 52, no. 15, pp. 2961-2974, 2008.
[25] H. Xie, R.Y. Yang, A. Krishnamurthy, Y.G. Liu, and A. Silberschatz, "P4P: Provider Portal for Applications," SIGCOMM Computer Comm. Rev., vol. 38, no. 4, pp. 351-362, 2008.
[26] X. Yang and G. de Veciana, "Service Capacity of Peer to Peer Networks," Proc. IEEE INFOCOM, 2004.
[27] Y. Zhou, D.-M. Chiu, and J.C.S. Lui, "A Simple Model for Analyzing P2P Streaming Protocols," Proc. IEEE Int'l Conf. Network Protocols (ICNP), pp. 226-235, 2007.
46 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool