Skip to main content
Article thumbnail
Location of Repository

Cross-layer peer-to-peer traffic identification and optimization based on active networking

By I. Dedinski, H. DeMeer, L. Han, L. Mathy, D. Pezaros, J. Sventek and Z. Xiaoying

Abstract

P2P applications appear to emerge as ultimate killer applications due to their ability to construct highly dynamic overlay topologies with rapidly-varying and\ud unpredictable traffic dynamics, which can constitute a serious challenge even for significantly over-provisioned IP networks. As a result, ISPs are facing new, severe\ud network management problems that are not guaranteed to be addressed by statically deployed network engineering mechanisms. As a first step to a more complete solution to\ud these problems, this paper proposes a P2P measurement, identification and optimisation architecture, designed to cope with the dynamicity and unpredictability of existing, well-known and future, unknown P2P systems. The purpose of this architecture is to provide to the ISPs an effective and scalable approach to control and optimise the traffic produced by P2P applications in their networks. This can be achieved through a combination of different application and network-level programmable techniques, leading to a crosslayer identification and optimisation process. These techniques can be applied using Active Networking platforms, which are able to quickly and easily deploy architectural components on demand. This flexibility of the optimisation architecture is essential to address the rapid development of new P2P protocols and the variation of known\ud protocols

Topics: QA75
Year: 2005
OAI identifier: oai:eprints.gla.ac.uk:34531
Provided by: Enlighten

Suggested articles

Citations

  1. (2004). A Measurement-based Traffic Profile of the eDonkey Filesharing Service. doi
  2. (1995). A Parameterizable Methodology for Internet Traffic Flow Profiling. doi
  3. (2001). A Wavelet Tour of Signal Processing. doi
  4. (2004). Accurate, scalable in-network identification of p2p traffic using application signatures”, doi
  5. (1992). An introduction to the wavelets. doi
  6. (2004). Analysis and Application of Passive Peer Influence on Peer-to-Peer Inter-Domain Traffic”, doi
  7. (2003). Analysis of ADSL traffic on an IP Backbone link, doi
  8. (2002). Analyzing peer-to-peer traffic across large networks", doi
  9. (1999). Application Level Active Networking”, doi
  10. (1993). Application of Sampling Methodologies to Network Traffic Characterisation, doi
  11. (2002). Are File Swapping Networks Cacheable? Characterizing P2P Traffic",
  12. (2004). Clustering in Peer-toPeer File Sharing Workloads, doi
  13. (1997). Comparative study of clustering methods, doi
  14. (2001). Component-based Active Network Architecture”, doi
  15. (2003). Dynamic Operation in Peer-to-Peer Overlay Networks. doi
  16. (2003). File-sharing in the Internet: A characterization of P2P traffic in the backbone”Technical report. doi
  17. (1994). Internet Traffic Characterization. doi
  18. Is P2P dying or just hiding?, doi
  19. (2003). modeling, and analysis of a peer-to-peer file-sharing workload, doi
  20. (2001). Multiresolution signal decomposition --Transforms, Subbands, and Wavelets. doi
  21. (2002). Passive Traffic Measurement for IP Operations, The Internet as a Large-Scale Complex System
  22. (2001). Peer-to-Peer: Harnessing the Benefits of a Disruptive Technology, O’ Reilly, doi
  23. (2005). Sampling Techniques for Non-Intrusive QoS Measurements: Challenges and Strategies, to appear in
  24. (1997). Traffic Flow Measurement:
  25. (2004). Transport layer identification of P2P traffic”, doi
  26. (1998). Wavelet Analysis of Long Range Dependent Traffic”, doi
  27. (1996). Wavelets: Theory and Applications. doi

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.