Abstract
The flourish of P2P systems draws a lot of attention of networking researchers. Some research efforts focus on P2P systems, trying to understand the mechanism of various implementations and the behavior pattern of P2P users, and then improve the systems’ performance. Others look at the issue from the angle of ISPs, trying to help ISPs solve various issues brought by P2P applications. In this article, we conduct a review study on recent research efforts in these two areas. The first part of this article focuses on several key strategies that have significant influence on the performance of P2P systems. In the second part, we review some important techniques for ISPs to manage P2P traffic, i.e., blocking, caching and localization, and compare their advantages and disadvantages.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Notes
The last piece problem means a node has difficulty finding a peer that possesses the last piece, increasing the overall download time significantly in distribution systems.
References
Kulbak Y, Bickson D (2005) The emule protocol specification. Tech. Rep., http://www.cs.huji.ac.il/labs/danss/presentations/emule.pdf
Wang JH, Chiu DM, Lui JC (2008) A game-theoretic analysis of the implications of overlay network traffic on isp peering. Comput Networks 52(15):2961–2974
Karagiannis T, Broido A, Brownlee N, Claffy KC, Faloutsos M (2004) Is p2p dying or just hiding? In: GLOBECOM 2004. Dallas, Texas, USA, IEEE Computer Society Press
Androutsellis-Theotokis S, Spinellis D (2004) A survey of peer-to-peer content distribution technologies. ACM Comput Surv 36(4):335–371
Lua EK, Crowcroft J, Pias M, Sharma R, Lim S (2005) A survey and comparison of peer-to-peer overlay network schemes. IEEE Commun Surv Tutor 7:72–93
Marciniak P, Liogkas N, Legout A, Kohler E (2008) Small is not always beautiful. In: IPTPS’08, the 7th international workshop on peer-to-peer systems, Tampa Bay, Florida, USA
Legout A, Urvoy-Keller G, Michiardi P (2006) Rarest first and choke algorithms are enough. In: IMC’2006, ACM SIGCOMM/USENIX conference, Rio de Janeiro, Brazil
Huang Y, Fu TZJ, Chiu D-M, Lui JCS, Huang C (2008) Challenges, design and analysis of a large-scale p2p-vod system. In: SIGCOMM ’08: proceedings of the ACM SIGCOMM 2008 conference on data communication, Seattle, WA, USA, pp 375–388
Zhou Y, Ming Chiu D, Lui JCS (2007) A Simple Model for Analyzing P2P Streaming Protocols. IEEE International Conference on Network Protocols, 2007. ICNP 2007. pp 226–235. doi:10.1109/ICNP.2007.4375853
Vlavianos A, Iliofotou M, Faloutsos M (2006) Bitos: enhancing bittorrent for supporting streaming applications. In: IEEE global internet, pp 1–6
Zhao B, Lui J, Chiu D-M (2009) Exploring the optimal chunk selection policy for data-driven p2p streaming systems. In: IEEE ninth international conference on peer-to-peer computing, 2009. P2P ’09, pp 271–280
Bharambe AR, Herley C, Padmanabhan VN (2006) Analyzing and improving a bittorrent network’s performance mechanisms. In: IEEE Infocom 2006, Barcelona, Spain
Kostic D, Braud R, Killian CE, Vandekieft E, Anderson JW, Snoeren AC, Vahdat A (2005) Maintaining high bandwidth under dynamic network conditions. In: ATEC ’05: proceedings of the annual conference on USENIX annual technical conference
Gkantsidis C, Rodriguez P (2005) Network coding for large scale content distribution. In: IEEE infocom 2005, Miami, USA
Jun S, Ahamad M (2005) Incentives in bittorrent induce free riding. In: P2PECON ’05: proceedings of the 2005 ACM sigcomm workshop on economics of peer-to-peer systems, pp 116–121
Sherman A, Nieh J, Stein C (2009) Fairtorrent: bringing fairness to peer-to-peer systems. In: CoNEXT ’09: proceedings of the 5th international conference on emerging networking experiments and technologies. New York, NY, USA: ACM, pp 133–144
Chan JS, Li VO, Lui K-S (2007) Performance comparison of scheduling algorithms for peer-to-peer collaborative file distribution. IEEE J Sel Areas Commun 25(1):146–154
Halme A (2005) Peer-to-peer traffic: impact on isps and evaluation of traffic management tools. In: HUT T-110.551 seminar on internetworking
Roughan M, Sen S, Spatscheck O, Duffield N (2004) Class-of-service mapping for qos: a statistical signature-based approach to ip traffic classification. In: IMC 04: proceedings of the 4th ACM SIGCOMM conference on internet measurement. New York, USA, pp 135–148
Constantinou F, Mavrommatis P (2006) Identifying known and unknown peer-to-peer traffic. In: IEEE international symposium on network computing and applications, pp 93–102
Crotti M, Dusi M, Gringoli F, Salgarelli L (2007) Traffic classification through simple statistical fingerprinting. Comput Commun Rev 37(1):5–16
Suh K, Figueiredo DR, Kurose J, Towsley D (2006) Characterizing and detecting skype-relayed traffic. In: INFOCOM 2006. 25th IEEE international conference on computer communications, Barcelona, Spain, pp 1–12
Moore AW, Zuev D (2005) Internet traffic classification using bayesian analysis techniques. In: ACM SIGMETRICS 2005, Banff, Alberta, Canada
Couto A, Nogueira A, Salvador P, Valadas R (2008) Identification of peer-to-peer applications’ flow patterns. In: Next generation internet networks, NGI 2008, pp 292–299
Subhabrata S, Oliver S, Wang D (2004) Accurate, scalable in-network identification of p2p traffic using application signatures. In: WWW ’04: proceedings of the 13th international conference on world wide web, pp 512–521
Dischinger M, Mislove A, Haeberlen A, Gummadi KP (2008) Detecting bittorrent blocking. In: Proceedings of the 8th ACM SIGCOMM conference on internet measurement (IMC’08), Vouliagmeni, Greece
Wierzbicki A, Leibowitz N, Ripeanu M, Wozniak R (2004) Cache replacement policies revisited: the case of p2p traffic. Los Alamitos, CA, USA, pp 182–189
Leibowitz N, Bergman A, Ben-Shaul R, Shavit A (2002) Are file swapping networks cacheable? Characterizing p2p traffic. In: The 7th international workshop on web content caching and distribution (WCW’02), Boulder, CO, USA
Huang N-F, Chu Y-M, Tsai C-H, Huang W-Z, Tzeng W-J (2009) A resource-efficient traffic localization scheme for multiple bittorrents. In: IEEE international conference on communications, 2009. ICC ’09, pp 1–5
Saleh O, Hefeeda M (2006) Modeling and caching of peer-to-peer traffic. In: IEEE international conference on network protocols, pp 249–258
Ye M, Wu J, Xu K (2008) Caching the p2p traffic in isp network. In: IEEE international conference on communications, 2008, ICC ’08, pp 5876–5880
Tagami A, Hasegawa T, Hasegawa T (2004) Analysis and application of passive peer influence on peer-to-peer inter-domain traffic. In: P2P ’04: proceedings of the fourth international conference on peer-to-peer computing. Washington, DC, USA: IEEE Computer Society, pp 142–150
Papafili I, Soursos S, Stamoulis GD (2009) Improvement of bittorrent performance and inter-domain traffic by inserting isp-owned peers. In: ICQT ’09: proceedings of the 6th international workshop on internet charging and Qos technologies. Berlin, Heidelberg: Springer-Verlag, pp 97–108
Gummadi KP, Dunn RJ, Saroiu S, Gribble SD, Levy HM, Zahorjan J (2003) Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. SIGOPS Oper Syst Rev 37(5):314–329
Hamada T, Chujo K, Chujo T, Yang X (2004) Peer-to-peer traffic in metro networks: analysis, modeling, and policies. In: Network operations and management symposium, NOMS 2004. IEEE/IFIP, vol 1, pp 425–438
Karagiannis T, Rodriguez P, Papagiannaki K (2005) Should internet service providers fear peer-assisted content distribution? In: IMC’05: proceedings of the 5th ACM SIGCOMM conference on internet measurement, pp 63–76
Bindal R, Cao P, Chan W, Medved J, Suwala G, Bates T, Zhang A (2006) Improving traffic locality in bittorrent via biased neighbor selection. In: 26th IEEE international conference on distributed computing systems, ICDCS 2006, p 66
Vishnumurthy V, Francis P (2008) On the difficulty of finding the nearest peer in p2p systems. In: IMC ’08: proceedings of the 8th ACM SIGCOMM conference on internet measurement. New York, NY, USA: ACM, pp 9–14
Li W, Chen S, Yu T (2008) Utaps: an underlying topology-aware peer selection algorithm in bittorrent. In: International conference on advanced information networking and applications, pp 539–545
Choffnes DR, Bustamante FE (2008) Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems. SIGCOMM Comput Commun Rev 38(4):363–374
Aggarwal V, Feldmann A, Scheideler C (2007) Can isps and p2p users cooperate for improved performance? SIGCOMM Comput Commun Rev 37(3):29–40
Xie H, Yang YR, Krishnamurthy A, Liu Y, Silberschatz A (2008) P4P: provider portal for applications. In: Proceedings of ACM SIGCOMM, Seattle, WA
Oechsner S, Lehrieder F, Hossfeld T, Metzger F, Staehle D, Pussep K (2009) Pushing the performance of biased neighbor selection through biased unchoking. In: IEEE ninth international conference on peer-to-peer computing, 2009. P2P ’09, pp 301–310
Seedorf J, Kiesel S, Stiemerling M (2009) Traffic localization for p2p-applications: the alto approach. In: IEEE ninth international conference on peer-to-peer computing, 2009, P2P ’09, pp 171–177
Gurbani V, Hilt V, Rimac I, Tomsu M, Marocco E (2009) A survey of research on the application-layer traffic optimization problem and the need for layer cooperation. IEEE Commun Mag 47(8):107–112
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, J.H., Wang, C., Yang, J. et al. A study on key strategies in P2P file sharing systems and ISPs’ P2P traffic management. Peer-to-Peer Netw. Appl. 4, 410–419 (2011). https://doi.org/10.1007/s12083-010-0098-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-010-0098-7