期刊文献+

ISP感知的BitTorrent流量优化

ISP-Aware BitTorrent Traffic Optimization
下载PDF
导出
摘要 跨互联网服务提供商(ISP)的BitTorrent流量严重降低互联网的运行效率。结合BitTorrent协议和不同ISP之间的连接结构,提出了ISP感知的BitTorrent流量优化方案STracker。STracker由不同ISP中的Tracker代理构成,Tracker代理之间以对等联网方式连接,通过Tracker代理完成节点维护和ISP感知的邻居分配,从而降低冗余的跨ISP流量。分析和模拟结果表明,STracker能够在不增加内容下载时间的条件下,大量降低跨ISP流量。STracker能够有效降低ISP的运营成本,提高互联网的效率。 BitTorrent-based applications incur massive cross-ISP traffic which heavily decreases Internet efficiency.Taking into account BitTorrent protocol specifications and connection structure among different ISPs,this paper proposes an ISP-aware BitTorrent traffic optimization scheme which is called STracker.STracker is composed of tracker proxies in different ISPs.Tracker proxies are connected with a P2P protocol.Tracker proxies perform node management and biased neighbor allocation.Therefore,the cross-ISP traffic is reduced.Analysis and simulations show that STracker can efficiently reduce the cross-ISP traffic while the download time is not increased.STracker can reduce the operation cost of ISPs and improve the efficiency of Internet efficiently.
作者 刘勇 秦志光
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2011年第4期582-586,共5页 Journal of University of Electronic Science and Technology of China
基金 国家自然科学基金(60873075)
关键词 BITTORRENT 互联网服务提供商 对等网络 流量控制 流量优化 BitTorrent internet service providers P2P networks traffic control traffic optimization
  • 相关文献

参考文献14

  • 1秦志光,罗绪成.P2P共享系统中无需专用TTP的公平交换协议[J].电子科技大学学报,2006,35(S1):698-701. 被引量:3
  • 2杨戈,廖建新,朱晓民,王纯.面向对等网络的流媒体接纳控制[J].北京邮电大学学报,2008,31(1):48-51. 被引量:3
  • 3BONFIGLIO D, MELLIA M, MEO M, et al. Revealing skype traffic: When randomness plays with you[J]. SIGCOMM Computer Communication Review, 2007, 37(4) 37-48. 被引量:1
  • 4HUANG YAM, FU TOM Z. J., CHIU DAH-MING, et al. Challenges, design and analysis of a large-scale p2p-vod system[J]. SIGCOMM Computer Communication Review, 2008, 38(4): 375-388. 被引量:1
  • 5COHEN B. BitTorrent protocol[EB/OL]. [2009-09-01] http://www.bittorrent.org/beps/bep_0003.html. 被引量:1
  • 6HENDRIK S, KLAUS M. Internet study 2008/2009 [EB/OL]. [2009-09--01] http://www.ipoque.com/resources. 被引量:1
  • 7RUCHIR B, CAO PEI, CHAN WILLIAM, et al. Improving traffic locality in bittorrent via biased neighbor seleetion[C]//Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006). Washington, DC, USA: IEEE, 2006: 66. 被引量:1
  • 8XIE H Y, YANG Y R, ARVIND K, et al. P4p: Provider portal for applications[J]. Sigcomm Computer Communication Review, 2008, 38(4): 351-362. 被引量:1
  • 9DAVID R C, BUSTAMANTE F E. Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems[J]. SIGCOMM Computer Communication Review, 2008, 38(4): 363-374. 被引量:1
  • 10SU Ao-jan, CHOFFNES D IL ALEKSANDAR K, et al. Drafting behind akarnai (travelocity-based detouring)[J]. SIGCOMM Computer Communication Review, 2006, 36(4): 435-446. 被引量:1

二级参考文献14

  • 1刘亚杰,窦文华.一种P2P环境下的VoD流媒体服务体系[J].软件学报,2006,17(4):876-884. 被引量:29
  • 2程久军,李玉宏,程时端,马建.移动P2P系统体系结构与关键技术的研究[J].北京邮电大学学报,2006,29(4):86-89. 被引量:18
  • 3Chen Ing-Ray, Li Sheng-Tun. A cost-based admission control algorithm for handling mixed workloads in multimedia server systems [ C ]//Proceedings Eighth International Conference on Parallel and Distributed Systems. Kyongju City: [s. n. ], 2001: 543-548. 被引量:1
  • 4Roger Zimmermann, Kun Fu. Comprehensive statistical admission control for streaming media servers[ C]//Proceedings of the Eleventh ACM International Conference on Multimedia. [S.l. ]: ACM press, 2003: 75-85. 被引量:1
  • 5Lai Yuancheng, Lin Yudar. A fair admission control for large-bandwidth multimedia applications[J]. 22nd International Conference on Distributed Computing Systems Workshops, 2002, 6(8): 317-322. 被引量:1
  • 6Xu D, Hefeeda M, Hambrusch S, et al. On peer-to-peer media streaming [ C]//IEEE Conference on Distributed Computing Systems. [ S. l. ]: IEEE press, 2002 : 363- 371. 被引量:1
  • 7Chen Gang, Wu Guoxin. A client peer adjustment policy for peer-to-peer media streaming[J ]. International Conference on Hybrid Information Technology, 2006, 1(3): 98-102. 被引量:1
  • 8Hstad J,Schrift A W,Shamir A.The discrete logarithm modulo a composite hides O(n)Bits[].Journal of Computer and System Sciences.1993 被引量:1
  • 9Shamir A.Identity-based cryptosystems and signature schemas[].CRYPTO on Advances in cryptology.1984 被引量:1
  • 10Boneh D,Franklin M.Efficient generation of shared RSA keys[].Journal of the ACM.2001 被引量:1

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部