Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1402958.1402999acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free access

P4p: provider portal for applications

Published: 17 August 2008 Publication History

Abstract

As peer-to-peer (P2P) emerges as a major paradigm for scalable network application design, it also exposes significant new challenges in achieving efficient and fair utilization of Internet network resources. Being largely network-oblivious, many P2P applications may lead to inefficient network resource usage and/or low application performance. In this paper, we propose a simple architecture called P4P to allow for more effective cooperative traffic control between applications and network providers. We conducted extensive simulations and real-life experiments on the Internet to demonstrate the feasibility and effectiveness of P4P. Our experiments demonstrated that P4P either improves or maintains the same level of application performance of native P2P applications, while, at the same time, it substantially reduces network provider cost compared with either native or latency-based localized P2P applications.

References

[1]
V. Aggarwal, A. Feldmann, and C. Scheideler. Can ISPs and P2P systems cooperate for improved performance? ACM CCR, July 2007.
[2]
D. Applegate and E. Cohen. Making intra-domain routing robust to changing and uncertain traffic demands: Understanding fundamental tradeoffs. In Proc of SIGCOMM, Karlsruhe, Germany, Aug. 2003.
[3]
A. Bharambe, C. Herley, and V. Padmanabhan. Analyzing and improving a BitTorrent network's performance mechanisms. In Proceedings of IEEE INFOCOM '06, Barcelona, Spain, Apr. 2006.
[4]
R. Bindal, P. Cao, W. Chan, J. Medval, G. Suwala, T. Bates, and A. Zhang. Improving traffic locality in Bittorrent via biased neighbor selection. In Proceedings of IEEE ICDCS '06, Lisboa, Portugal, July 2006.
[5]
S. Cerruti and C. Wright. ISP bandwidth billing. http://www.servicelevel.net/rating_matters/newsletters/issue13.htm, 2002.
[6]
Cisco. Network-based application recognition (NBAR). www.cisco.com/univercd/cc/td/doc/product/software/ios122/122newft/122t/122t8/dtnbarad.htm.
[7]
F5 White Paper. Bandwidth management for peer-to-peer applications. http://www.f5.com/solutions/technology/rateshaping_wp.html, Jan. 2006.
[8]
K. Gummadi, R. Dunn, S. Saroiu, S. Gribble, H. Levy, and J. Zahorjan. Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. In Proc. of SOSP '03, Bolton Landing, Oct. 2003.
[9]
Joost. http://www.joost.org/whatsjoost.html.
[10]
S. Kandula, D. Katabi, B. Davie, and A. Charny. Walking the tightrope: Responsive yet stable traffic engineering. In Proc of SIGCOMM, Philadelphia, PA, Aug. 2005.
[11]
T. Karagiannis, D. Papagiannaki, and M. Faloutsos. BLINC: Multilevel traffic classification in the dark. In Proc of SIGCOMM, Philadelphia, PA, Aug. 2005.
[12]
T. Karagiannis, P. Rodriguez, and K. Papagiannaki. Should internet service providers fear peer-assisted content distribution? In Proceedings of the Internet Measurement Conference, Berkeley, CA, Oct. 2005.
[13]
R. Keralapura, N. Taft, C.-N. Chuah, and G. Iannaccone. Can ISPs take the heat from overlay networks? In Proc. of HotNets-III, San Diego, CA, Nov. 2004.
[14]
Kontiki. http://www.kontiki.com.
[15]
A. Kuzmanovic and E. Knightly. TCP-LP: Low-priority service via end-point congestion control. IEEE/ACM Transactions on Networking, 14(4), Aug. 2006.
[16]
N. Leibowitz, A. Bergman, R. Ben-Shaul, and A. Shavit. Are file swapping networks cacheable? characterizing P2P traffic. In Proceedings of WCW, Boulder, CO, 2002.
[17]
H. V. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy, and A. Venkataramani. iPlane: An information plane for distributed services. In Proc. of OSDI, Seattle, WA, 2006.
[18]
A. Odlyzko. Internet pricing and the history of communications. Computer Networks, 36(5-6):493--517, Aug. 2001.
[19]
P-Cube. P-Cube. http://www.p-cube.net/indexold.shtml.
[20]
Packeteer. Packeteer PacketShaper. http://www.packeteer.com/products/packetshaper.
[21]
Pando Networks, Inc. http://www.pandonetworks.com.
[22]
M. Piatek, C. Dixon, A. Krishnamurthy, and T. Anderson. Liveswarms: Adapting bittorrent for end host multicast. Technical Report UW-CSE-06-11-01, University of Washington, 2006.
[23]
D. Qiu and R. Srikant. Modeling and performance analysis of Bittorrent-like peer-to-peer networks. In Proc. of SIGCOMM, Portland, OR, Aug. 2004.
[24]
L. Qiu, Y. R. Yang, Y. Zhang, and S. Shenker. Selfish routing in Internet-like environments. In Proc of SIGCOMM, Karlsruhe, Germany, Aug. 2003.
[25]
B. Raghavan and A. C. Snoeren. A system for authenticated policy-compliant routing. In Proc. of SIGCOMM, Portland, OR, Aug. 2004.
[26]
RouteScience Technologies, Inc. Route optimization for ebusiness applications. White Paper. Available at http://www.routescience.com, June 2003.
[27]
O. Saleh and M. Hefeeda. Modeling and caching of peer-to-peer traffic. Technical Report TR 2006-11, Simon Fraser University, May 2006.
[28]
Sandvine. Intelligent broadband network management. http://www.sandvine.com.
[29]
S. Saroiu, K. P. Gummadi, R. J. Dunn, S. D. Gribble, and H. M. Levy. An analysis of internet content delivery systems. In Proc of OSDI, Boston, MA, Dec. 2002.
[30]
S. Seetharaman and M. Ammar. Characterizing and mitigating inter-domain policy violations in overlay routes. In Proc of ICNP, 2006.
[31]
S. Sen, O. Spatscheck, and D. Wang. Accurate, scalable in-network identification of P2P traffic using application signatures. In Proceedings of WWW13, New York, NY, May 2004.
[32]
G. Shen, Y. Wang, Y. Xiong, B. Y. Zhao, and Z.-L. Zhang. HPTP: Relieving the tension between ISPs and P2P. In Proc of IPTPS, Bellevue, WA, Feb. 2007.
[33]
Statelog White Paper. Peer-to-peer and bandwidth management. http://www.staselog.com/whitepaper-p2p.pdf, Mar. 2004.
[34]
A. Venkataramani, R. Kokku, and M. Dahlin. TCP Nice: A mechanism for background transfers. In Proc of OSDI, Boston, MA, Dec. 2002.
[35]
H. Wang, H. Xie, L. Qiu, A. Silberschatz, and Y. R. Yang. Optimal ISP subscription for Internet multihoming: Algorithm design and implication analysis. In Proceedings of IEEE INFOCOM '05, Miami, FL, Apr. 2005.
[36]
A. Wierzbicki, N. Leibowitz, M. Ripeanu, and R. Wozniak. Cache replacement policies revisited. In Proc of GP2P, Chicago, IL, Apr. 2004.
[37]
R. Woundy and J. Livingood. Comcast field tests. IETF P2P infrastructure workshop, May 2008.

Cited By

View all
  • (2024)ALTO-assisted Peer Selection in Bitcoin P2P NetworkAdvances in Artificial Intelligence Research10.54569/aair.16087024:2(117-123)Online publication date: 30-Dec-2024
  • (2021)Content Delivery Network Security: A SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2021.309349223:4(2166-2190)Online publication date: Dec-2022
  • (2020)Toward Awareness Locality Algorithms of Peer-to-Peer File Sharing NetworkProceedings of the 2020 5th International Conference on Cloud Computing and Internet of Things10.1145/3429523.3429529(6-12)Online publication date: 22-Sep-2020
  • Show More Cited By

Index Terms

  1. P4p: provider portal for applications

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SIGCOMM '08: Proceedings of the ACM SIGCOMM 2008 conference on Data communication
      August 2008
      452 pages
      ISBN:9781605581750
      DOI:10.1145/1402958
      • cover image ACM SIGCOMM Computer Communication Review
        ACM SIGCOMM Computer Communication Review  Volume 38, Issue 4
        October 2008
        436 pages
        ISSN:0146-4833
        DOI:10.1145/1402946
        Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 17 August 2008

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. network application
      2. network architecture
      3. p2p

      Qualifiers

      • Research-article

      Conference

      SIGCOMM '08
      Sponsor:
      SIGCOMM '08: ACM SIGCOMM 2008 Conference
      August 17 - 22, 2008
      WA, Seattle, USA

      Acceptance Rates

      Overall Acceptance Rate 462 of 3,389 submissions, 14%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)66
      • Downloads (Last 6 weeks)22
      Reflects downloads up to 24 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)ALTO-assisted Peer Selection in Bitcoin P2P NetworkAdvances in Artificial Intelligence Research10.54569/aair.16087024:2(117-123)Online publication date: 30-Dec-2024
      • (2021)Content Delivery Network Security: A SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2021.309349223:4(2166-2190)Online publication date: Dec-2022
      • (2020)Toward Awareness Locality Algorithms of Peer-to-Peer File Sharing NetworkProceedings of the 2020 5th International Conference on Cloud Computing and Internet of Things10.1145/3429523.3429529(6-12)Online publication date: 22-Sep-2020
      • (2019)A Multi-Dimension Spatial Method for Topology Awareness and Multipath GeneratingSymmetry10.3390/sym1107087011:7(870)Online publication date: 3-Jul-2019
      • (2019)An Objective-Driven On-Demand Network Abstraction for Adaptive ApplicationsIEEE/ACM Transactions on Networking10.1109/TNET.2019.289990527:2(805-818)Online publication date: 1-Apr-2019
      • (2019)Quality Enhancement of P2P using Interested Clusters in the P4P Architecture2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)10.1109/ICAwST.2019.8923493(1-6)Online publication date: Oct-2019
      • (2019)Deep Learning for Automatic Identification of Nodule Morphology Features and Prediction of Lung Cancer2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)10.1109/ICAwST.2019.8923147(1-6)Online publication date: Oct-2019
      • (2018)Modeling, Analysis, and Implementation of Universal Acceleration Platform Across Online Video Sharing SitesIEEE Transactions on Services Computing10.1109/TSC.2016.256547011:3(534-548)Online publication date: 1-May-2018
      • (2018)Performance analysis of a locality-aware BitTorrent protocol in enterprise networksPeer-to-Peer Networking and Applications10.1007/s12083-018-0674-9Online publication date: 15-Aug-2018
      • (2017)Delay Insertion Based P2PTV Traffic Localization Considering Peer's Relaying CapabilityIEICE Transactions on Communications10.1587/transcom.2016EBP3367E100.B:10(1798-1806)Online publication date: 2017
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media