The Community for Technology Leaders
RSS Icon
Issue No.06 - June (2012 vol.23)
pp: 1030-1037
Marco Papa Manzillo , Politecnico di Torino, Torino
Luigi Ciminiera , Politecnico di Torino, Torino
Guido Marchetto , Politecnico di Torino, Torino
Fulvio Risso , Politecnico di Torino, Torino
Current Peer-to-Peer (P2P) file sharing systems make use of a considerable percentage of Internet Service Providers (ISPs) bandwidth. This paper presents the Collaborative Locality-aware Overlay SERvice (CLOSER), an architecture that aims at lessening the usage of expensive international links by exploiting traffic locality (i.e., a resource is downloaded from the inside of the ISP whenever possible). The paper proves the effectiveness of CLOSER by analysis and simulation, also comparing this architecture with existing solutions for traffic locality in P2P systems. While savings on international links can be attractive for ISPs, it is necessary to offer some features that can be of interest for users to favor a wide adoption of the application. For this reason, CLOSER also introduces a privacy module that may arouse the users' interest and encourage them to switch to the new architecture.
P2P, file sharing, traffic locality, privacy.
Marco Papa Manzillo, Luigi Ciminiera, Guido Marchetto, Fulvio Risso, "CLOSER: A Collaborative Locality-Aware Overlay SERvice", IEEE Transactions on Parallel & Distributed Systems, vol.23, no. 6, pp. 1030-1037, June 2012, doi:10.1109/TPDS.2011.249
[1] D.R. Choffnes and F.E. Bustamante, "Taming the Torrent: A Practical Approach to Reducing Cross-ISP Traffic in Peer-to-Peer Systems," Proc. ACM SIGCOMM, pp. 363-374, 2008.
[2] "Kontiki," http:/, 2011.
[3] V. Aggarwal, A. Feldmann, and C. Scheideler, "Can ISPS and P2P Users Cooperate for Improved Performance?," ACM SIGCOMM, vol. 37, no. 3, pp. 29-40, 2007.
[4] H. Xie, Y.R. Yang, A. Krishnamurthy, Y.G. Liu, and A. Silberschatz, "P4P: Provider Portal for Applications," Proc. ACM SIGCOMM, pp. 351-362, 2008.
[5] J. Seedorf, S. Kiesel, and M. Stiemerling, "Traffic Localization for P2P-Applications: The Alto Approach," Proc. IEEE Ninth Int'l Conf. Peer-to-Peer Computing (P2P '09), pp. 171-177, Sept. 2009.
[6] W. Huang, C. Wu, and F. Lau, "The Performance and Locality Tradeoff in Bittorrent-Like P2P File-Sharing Systems," Proc. IEEE Int'l Conf. Comm. (ICC), pp. 1-5, May 2010.
[7] F. Lehrieder, S. Oechsner, T. Hossfeld, Z. Despotovic, W. Kellerer, and M. Michel, "Can P2P-Users Benefit from Locality-Awareness?," Proc. IEEE 10th Int'l Conf. Peer-to-Peer Computing (P2P), pp. 1-9, Aug. 2010.
[8] R. Cuevas, N. Laoutaris, X. Yang, G. Siganos, and P. Rodriguez, "Deep Diving into Bittorrent Locality," Proc. ACM SIGMETRICS Int'l Conf. Measurement and Modeling of Computer Systems, pp. 349-350, 2010.
[9] "ANts P2P," http:/, 2011.
[10] "MUTE," http:/, 2011.
[11] "The OFF system," http:/, 2011.
[12] I. Clarke, S.G. Miller, T.W. Hong, O. Sandberg, and B. Wiley, "Protecting Free Expression Online with Freenet," IEEE Internet Computing, vol. 6, no. 1, pp. 40-49, Jan./Feb. 2002.
[13] P. Dhungel, M. Steiner, I. Rimac, V. Hilt, and K. Ross, "Waiting for Anonymity: Understanding Delays in the tor Overlay," Proc. IEEE 10th Int'l Conf. Peer-to-Peer Computing (P2P), pp. 1-4, Aug. 2010.
[14] B. Liu, Y. Cui, Y. Lu, and Y. Xue, "Locality-Awareness in Bittorrent-Like P2P Applications," IEEE Trans. Multimedia, vol. 11, no. 3, pp. 361-371, Apr. 2009.
[15] M. Lin, J. Lui, and D.-M. Chiu, "An ISP-Friendly File Distribution Protocol: Analysis, Design, and Implementation," IEEE Trans. Parallel and Distributed Systems, vol. 21, no. 9, pp. 1317-1329, Sept. 2010.
[16] P. Racz, S. Oechsner, and F. Lehrieder, "BGP-Based Locality Promotion for P2P Applications," Proc. 19th Int'l Conf. Computer Comm. and Networks (ICCCN), pp. 1-8, Aug. 2010.
[17] H. Wang, J. Liu, B. Chen, K. Xu, and Z. Ma, "On Tracker Selection for Peer-to-peer Traffic Locality," Proc. IEEE 10th Int'l Conf. Peer-to-Peer Computing (P2P), pp. 1-10, Aug. 2010.
[18] P. Maymounkov and D. Mazières, "Kademlia: A Peer-to-Peer Information System Based on the XOR Metric," Proc. First Int'l Workshop Peer-to-Peer Systems, pp. 53-65, 2002.
[19] T. Klinberg and R. Manfredi, "Gnutella 0.6," http://groups., June 2002.
[20] MaxMind LLC, "GeoIP," http:/, 2011.
[21] E. Van Der Sar, "Uncovering the Dark Side of P4P," http://torrentfreak.comuncovering-the-dark-side-of-p4p-080824 /, Aug. 2008.
[22] T. Mennecke, "Local Sharing Saves Bandwidth on BitTorrent/P4P Tests," http://www.slyck.comstory1748_Local_Sharing_ Saves_Bandwidth_on_BitTorr entP4P_Tests , Aug. 2008.
[23] M.J. Freedman and R. Morris, "Tarzan: A Peer-to-peer Anonymizing Network Layer," CCS '02: Proc. Ninth ACM Conf. Computer and Comm. Security, pp. 193-206, 2002.
[24] M. Rennhard and B. Plattner, "Introducing Morphmix: Peer-to-Peer Based Anonymous Internet Usage with Collusion Detection," WPES '02: Proc. ACM Workshop Privacy in the Electronic Soc., pp. 91-102, 2002.
[25] "Tor: Anonymity Online," http:/, 2011.
[26] S. Floyd and V. Jacobson, "Link-Sharing and Resource Management Models for Packet Networks," IEEE/ACM Trans. Networking, vol. 3, no. 4, pp. 365-386, Aug. 1995.
12 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool