Controlling P2P File-Sharing Networks' Traffic
نویسندگان
چکیده
Since the appearance of Peer-To-Peer (P2P) file-sharing networks some time ago, many Internet users have chosen this technology to share and search programs, videos, music, documents, etc. The total number of P2P file-sharing users has been increasing and decreasing in the last decade depending on the creation or end of some well known P2P file-sharing systems. P2P file-sharing networks traffic is currently overloading some data networks and it is a major headache for network administrators because it is difficult to control this kind of traffic (mainly because some P2P file-sharing networks encrypt their messages). This paper deals with the analysis, taxonomy and characterization of eight Public P2P file-sharing networks: Gnutella, Freeenet, Soulseek, BitTorrent, Opennap, eDonkey, MP2P and FastTrack. These eight most popular networks have been selected due to their different type of working architecture. Then, we will show the amount of users, files and the size of files inside these file-sharing networks. Finally, several network configurations are presented in order to control P2P file-sharing traffic in the network.
منابع مشابه
P2P Network Trust Management Survey
Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...
متن کاملEvaluating the behaviour of Peer-to-Peer IP traffic in wireless access networks
During the last few years, the use of Peer-to-Peer (P2P) applications for file exchange has increasingly gained popularity in the Internet. P2P file sharing applications generate an intensive amount of traffic both in downstream and upstream direction as they tend to exploit the available capacity of the underlying network. The coexistence of these greedy applications with delay sensitive appli...
متن کاملCache replacement policies for P2P file sharing protocols
Peer-to-peer (P2P) file-sharing applications generate a large part of today's Internet traffic. The large volume of this traffic (thus high potential caching benefits) and the large cache sizes required (thus nontrivial costs associated with caching) only underline that efficient cache replacement policies are important in this case. File popularity in P2P file-sharing networks does not follow ...
متن کاملP2P Replication Revisited: Mobile Infrastructures
Traffic engineering in P2P networks deals with organizing overlay networks. The challenge of unavailability has not been mastered yet. Considering the resource allocation can gain further improvements. While adapting P2P file sharing onto mobile infrastructures, we learned that replication is a solution to both issues: availability and traffic optimization.
متن کاملSimulating a File-Sharing P2P Network
Assessing the performance of peer-to-peer algorithms is impossible without simulations since testing new algorithms by deploying them in an existing P2P network is prohibitively expensive. However, some P2P algorithms are sensitive to the network and traffic models that are used in the simulations. In order to produce realistic results, we therefore require simulations that resemble real-world ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Network Protocols & Algorithms
دوره 3 شماره
صفحات -
تاریخ انتشار 2011