Advertisement

Towards an ISP-Compliant, Peer-Friendly Design for Peer-to-Peer Networks

  • Haiyong Xie
  • Yang Richard Yang
  • Avi Silberschatz
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4982)

Abstract

Peer-to-peer (P2P) applications are consuming a significant fraction of the total bandwidth of Internet service providers (ISPs). This has become a financial burden to ISPs and if not well addressed may lead ISPs to block or put strict rate limits on P2P traffic. In this paper, we propose a new framework, PCP, for designing P2P applications to smoothly fit into the global Internet. In our framework, an ISP decides on how much of its bandwidth is to be allocated to P2P clients, and P2P clients inside the network adopt a peer-friendly algorithm to fairly share the bandwidth. Using the widely-used percentile-based charging model and real traffic traces, we show that an ISP can allocate a large amount of bandwidth dedicated to P2P, without increasing its financial cost. We also show that P2P clients can use the algorithm to fairly share the allocated bandwidth.

Keywords

Internet Service Provider Charge Volume Volume Prediction Division Factor Charge Period 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Message Stream Encryption, http://www.azureuswiki.com
  2. 2.
    Aggarwal, V., Feldmann, A., Scheideler, C.: Can ISPs and P2P systems cooperate for improved performance? In: ACM CCR (July 2007)Google Scholar
  3. 3.
    CacheLogic. Serving cached content, http://www.cachelogic.com/products/cachepliance.php
  4. 4.
    Distributed Computing Industry Association, http://www.dcia.info
  5. 5.
    Odlyzko, A.: Internet pricing and the history of communications. Computer Networks 36, 493–517 (2001)CrossRefGoogle Scholar
  6. 6.
    Packeteer. Packeteer PacketShaper, http://www.packeteer.com/products/packetshaper
  7. 7.
    Parker, A.: The true picture of peer-to-peer filesharing (July 2004), http://www.cachelogic.com
  8. 8.
    Saleh, O., Hefeeda, M.: Modeling and caching of peer-to-peer traffic. In: Proceedings of ICNP 2006, Washington, DC (November 2006)Google Scholar
  9. 9.
    Sandvine. Intelligent broadband network management, http://www.sandvine.com
  10. 10.
    Saroiu, S., Gummadi, K.P., Dunn, R.J., Gribble, S.D., Levy, H.M.: An analysis of internet content delivery systems. In: Proceedings of OSDI 2002, Boston, MA (December 2002)Google Scholar
  11. 11.
    Xie, H., Krishnamurthy, A., Yang, Y. R., and Silberschatz, A. P4P: Proactive provider participation for P2P. Tech. Rep. YALEU/DCS/TR-1377, Yale University (March 2007)Google Scholar
  12. 12.
    Xie, H., Yang, Y.R.: A measurement-based study of the skype peer-to-peer VoIP performance. In: Proceedings of IPTPS 2007, Bellevue, WA (February 2007)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2008

Authors and Affiliations

  • Haiyong Xie
    • 1
  • Yang Richard Yang
    • 1
  • Avi Silberschatz
    • 1
  1. 1.Computer Science DepartmentYale UniversityNew HavenUSA

Personalised recommendations