首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
P2P应用的广泛流行给ISP骨干网络带来了前所未有的流量压力,P2P缓存(peer-to-peer caching)技术是目前缓解这种流量压力的最有效手段之一,缓存部署方法对P2P缓存系统的运行效率有重要影响.已有缓存部署方法分为两类:基于骨干节点的部署方法(node-based cache deployment, NCD)和基于骨干链路的部署方法(link-based cache deployment, LCD).在不同的P2P流量分布情形下,NCD与LCD各有优劣,但是,这两类方法未能充分发挥缓存的性能.提出一种基于点路结合的骨干网P2P缓存部署方法(node-Link based cache deployment, NLCD),根据缓存部署过程中P2P流量分布和缓存存储状态的动态变化,灵活选择骨干节点或骨干链路作为部署位置.建立了以网络负载最小化为目标的缓存部署模型,基于该模型将P2P缓存部署问题建模为一个最优化问题,由于流量分布和缓存状态会在部署过程中不断变化,不具有最优子结构性质.证明了该最优化问题为NP完全问题,并设计了一种启发式贪婪算法进行求解.实验结果表明,针对典型的H&S型、Ladder型骨干网络拓扑,使用NLCD的平均链路使用率比使用LCD低5%~15%,比使用NCD低7%~30%.  相似文献   

2.
The Internet is currently experiencing one of the most important challenges in terms of content distribution since its first uses as a medium for content delivery: users from passive downloaders and browsers are moving towards content producers and publishers. They often distribute and retrieve multimedia contents establishing network communities. This is the case of peer-to-peer IPTV communities.In this work we present a detailed study of P2P IPTV traffic, providing useful insights on both transport- and packet-level properties as well as on the behavior of the peers inside the network. In particular, we provide novel results on the (i) ports and protocols used; (ii) differences between signaling and video traffic; (iii) behavior of the traffic at different time scales; (iv) differences between TCP and UDP traffic; (v) traffic generated and received by peers; (vi) peers neighborhood and session duration. The knowledge gained thanks to this analysis is useful for several tasks, e.g. traffic identification, understanding the performance of different P2P IPTV technologies and the impact of such traffic on network nodes and links, and building more realistic models for simulations.1  相似文献   

3.
Traffic caused by P2P services dominates a large part of traffic on the Internet and imposes significant loads on the Internet, so reducing P2P traffic within networks is an important issue for ISPs. In particular, a huge amount of traffic is transferred within backbone networks; therefore reducing P2P traffic is important for transit ISPs to improve the efficiency of network resource usage and reduce network capital cost. To reduce P2P traffic, it is effective for ISPs to implement cache devices at some router ports and reduce the hop length of P2P flows by delivering the required content from caches. However, the design problem of cache locations and capacities has not been well investigated, although the effect of caches strongly depends on the cache locations and capacities. We propose an optimum design method of cache capacity and location for minimizing the total amount of P2P traffic based on dynamic programming, assuming that transit ISPs provide caches at transit links to access ISP networks. We apply the proposed design method to 31 actual ISP backbone networks and investigate the main factors determining cache efficiency. We also analyze the property of network structure in which deploying caches are effective in reducing P2P traffic for transit ISPs. We show that transit ISPs can reduce the P2P traffic within their networks by about 50-85% by optimally designing caches at the transit links to the lower networks.  相似文献   

4.
随着P2P软件的普及,P2P成为影响Internet网络结构的关键应用.在中国运营商的长途骨干网上,P2P流量占一半以上,不仅给ISP带来了巨大的压力,也使网络拥塞现象日益严重.据此本文以P2P常用协议BT为对象提出一种优化方案,通过用户协作与估算模拟底层网络相综合的方法,在不影响性能下,引导流量更多地在本地网络上发生,降低域间及主干网络上的P2P流量.测试表明,该机制不仅能尽量将域间流量本地化达到整体优化的目的。而且更能增强用户系统的性能.  相似文献   

5.
As Peer-to-Peer (P2P) systems are widely deployed in the Internet, P2P traffic control becomes a challenge for Internet Service Providers (ISPs) and P2P system vendors. Some recent works consider the interaction between ISPs and P2P systems, and propose ISP-friendly P2P traffic control mechanisms for reducing cross-ISP P2P traffic. In this paper, we consider another fundamental problem: the performance optimization and the interaction among multiple coexisting P2P systems. Specifically, we propose an ISP-friendly inter-overlay coordination framework (COOD) for controlling P2P traffic. The COOD framework consists of three important components: network traffic optimization, P2P service differentiation, and ISP policy enforcement. Our packet-level simulation results show that, compared with current P2P traffic control mechanisms, the COOD framework can provide better overall performance to multiple coexisting P2P systems, achieve service differentiation, and implement flexible mechanisms to effectively control cross-ISP P2P traffic.  相似文献   

6.
Peer-to-peer (P2P) based content distribution systems have emerged as the main form for content distribution on the Internet,which can greatly reduce the distribution cost of content providers and improve the overall system scalability.However,the mismatch between the overlay and underlay networks causes large volume of redundant traffic,which intensifies the tension between P2P content providers and ISPs.Therefore,how to efficiently use network resources to reduce the traffic burden on the ISPs is crucial for the sustainable development of P2P systems.This paper surveys the state-of-art P2P traffic optimization technologies from three perspectives:P2P cache,locality-awareness and data scheduling.Technological details,comparison between these technologies and their applicabilities are presented,followed by a discussion of the issues that remain to be addressed and the direction of future content distribution research.  相似文献   

7.
Many emerging broadband network technologies are dependent upon terrestrial based physical wiring to support megabit- and gigabit-per-second transmission rates. But the thirst for Internet connectivity and high performance remains unquenched. It cannot, and should not, be constrained by the physical wire. Wireless radio frequency (RF) mechanisms (such as general packet radio service, or GPRS) are becoming more popular for connecting mobile and fixed end users to the Internet, but they include performance and configuration limitations posed by technical, environmental, and geographic factors. An ideal solution would be a broadband wireless technology offering performance comparable to that of terrestrial links while supporting residential, corporate, and ISP network configurations and reaching just about anybody in the world, i.e., satellite communications  相似文献   

8.
Virtual Worlds (VW), such as Massive Multiplayer Online Social Games, have been gaining increasing attention in the last few years, mainly due to the new way users interact with them. However, little effort has been devoted to understand their traffic profile and the implications to the traffic management area. With the current growing rate of VWs’ usage, their traffic demand could eventually impose a significant burden on the operation of a typical Internet Service Provider (ISP) network. In this paper, we seek to understand the traffic behavior of an increasingly popular VW application, namely Second Life (SL), from both the connection and network level perspectives. We also show results of a traffic analysis of a SL client, when an avatar performs different actions in the VW, at different places and under different network conditions. Our results show that SL makes intensive use of network resources (mostly bandwidth), since the capacity needed for having a full SL experience (listening to live music) may reach 500 kbps. We then extend the traffic analysis work on SL by providing analytical models for its traffic profile. We aim at helping the network management and planning area to estimate the impact of an intense use of such VW on access links or core networks. Such synthetic models are also useful to the networking research community for the use in network simulations.  相似文献   

9.
Peer-to-peer (P2P) systems generate a major fraction of the current Internet traffic which significantly increase the load on ISP networks. To mitigate these negative impacts, many previous works in the literature have proposed caching of P2P traffic. But very few have considered designing a distributed caching infrastructure in the edge network. This paper demonstrates that a distributed caching infrastructure is more suitable than traditional proxy cache servers which cache data in disk, and it is viable to use the memory of users in the edge network as the cache space. This paper presents the design and evaluation of a distributed network cache infrastructure for P2P application, called BufferBank. BufferBank provides a number of application interfaces for P2P applications to make full use of the cache space. Three-level mapping is introduced and elaborated to improve the reliability and security of this distributed cache mechanism. Our measurement results suggest that BufferBank can decrease the data obtaining delay, compared with traditional P2P cache server based on disk.  相似文献   

10.
P2P节点智能选择机制的研究与实现   总被引:1,自引:0,他引:1  
对对等网络(P2P)的流量问题进行了分析,指出P2P流量问题产生的原因。融合网络运营商、地理位置等信息,提出了一种节点智能选择机制。该机制优先选择属于相同运营商和地理位置接近的节点作为数据交换对象,最大限度地将数据流量控制在本地网络和同一运营商的网络中,从而减少骨干网和网络出口的负载,同时提高了数据传输性能。在Bit Torrent (BT)系统中融合智能选择机制后,Tracker智能选择的节点在往返时延、路由跳数上均得到优化,实验数据表明该机制能有效减少“流量旅行”,提高P2P传输效率。  相似文献   

11.
Deep packet inspection (DPI) helps Internet service providers in efforts to profile networked applications. By relying on DPI systems, Internet service providers may apply different charging policies, traffic shaping, or offer quality of service (QoS) guarantees to selected users or applications. As critical network services rely on the precise characterization of network flows, building agile and efficient DPI systems has recently become an important research topic. In this paper, we present a comprehensive literature review on the tools and techniques necessary to develop modern DPI systems. We provide the essential technical background material and examine the current body of research in DPI engines’ optimization for commodity platforms. Then we discuss current research challenges and present guidelines for building high performance DPI systems.  相似文献   

12.
郭涛  周旭  王治平  唐晖 《计算机应用》2010,30(4):888-891
P2P技术的普及优化了用户的体验,但对带宽的过度消耗也带给网络运营商巨大的压力。据此提出基于网络测量的、业务相关P2P跨域流量优化机制,该机制对底层网络建立模型,通过综合考量底层的网络信息和具体P2P业务的特殊性来优化节点互联。实验结果表明,该处理机制明显减少了跨域流量,优化了P2P用户的体验。  相似文献   

13.
Novella   《Computer Networks》2006,50(18):3763-3783
Performance critical services over Internet often rely on geographically distributed architectures of replicated servers. Content Delivery Networks (CDN) are a typical example where service is based on a distributed architecture of replica servers to guarantee resource availability and proximity to final users. In such distributed systems, network links are not dedicated, and may be subject to external traffic. This brings up the need to develop access control policies that adapt to network load changing conditions. Further, Internet services are mainly session based, thus an access control support must take into account a proper differentiation of requests and perform session based decisions while considering the dynamic availability of resources due to external traffic.In this paper we introduce a distributed architecture with access control capabilities at session aware access points. We consider two types of services characterized by different patterns of resource consumption and priorities. We formulate a Markov Modulated Poisson Decision Process for access control that captures the heterogeneity of multimedia services and the variable availability of resources due to external traffic. The proposed model is optimized by means of stochastic analysis, showing the impact of external traffic on service quality. The structural properties of the optimal solutions are studied and considered as the basis for the formulation of heuristics. The performance of the proposed heuristics is studied by means of simulations, showing that in some typical scenario they perform close to the optimum.  相似文献   

14.
We study the interactions among Internet providers in vehicular networks which offer access to commuters via road side units (RSUs). Namely, we propose a game-theoretical framework to model the competition on prices between vehicular Internet providers to capture the largest amount of users, thus selfishly maximizing the revenues. The equilibria of the aforementioned game are characterized under different mobile traffic conditions, RSU capabilities and users requirements and expectations. In particular, we also consider in the analysis the case where mobile users modify the price they accept to pay for the access as the likeliness of finding an access solution decreases.Our game-theoretical analysis gives insights on the outcomes of the competition between vehicular Internet providers, further highlighting some counter-intuitive behaviors; as an example, comparing with the case when users have constant price valuation over time, having users inclined to increasing their “acceptable” price may force vehicle Internet providers to charge lower prices due to competition.  相似文献   

15.
The increasing amount of over-the-top (OTT) live streams and the lack of global network layer multicast support poses challenges for a scalable and efficient streaming over the Internet. Content Delivery Networks (CDNs) help by delivering the streams to the edge of almost every Internet Service Provider (ISP) network of the world but usually also end there. From there on, the streams are to be delivered to the clients using IP unicast, although an IP multicast functionality would be desirable to reduce the load on CDN nodes, transit links, and the ISP infrastructure. IP multicast is usually not available due to missing control and management features of the protocol. Alternatively, Peer-to-Peer (P2P) mechanisms can be applied to extend the overlay multicast functionality of the CDN towards the clients. Unfortunately, P2P only improves the situation for the CDN but makes it more challenging for the ISP as even more unicast flows are generated between clients inside and outside the ISP network. To tackle this problem, a Software-Defined Networking-based cross-layer approach, called Software-Defined Multicast (SDM), is proposed in this paper, enabling ISPs to offer network layer multicast support for OTT and overlay-based live streaming as a service. SDM is specifically tailored towards the needs of P2P-based video stream delivery originating from outside the ISP network and can easily be integrated with existing streaming systems. Prototypical evaluations show significantly improved network layer transmission efficiencies when compared to other overlay streaming mechanisms, down to a level as low as for IP multicast, at linearly bounded costs.  相似文献   

16.
The increase of HTTP-based video popularity causes that broadband and Internet service providers’ links transmit mainly multimedia content. Network planning, traffic engineering or congestion control requires an understanding of the statistical properties of network traffic; therefore, it is desirable to investigate the characteristic of traffic traces generated by systems which employ adaptive bit-rate streaming. Our first contribution is an investigation of traffic originating from 120 client-server pairs, situated in an emulated content distribution network, and multiplexed onto a single network link. We show that the structure of the traffic is distinct from the structure generated by the first and second generation of HTTP video systems, and furthermore, not similar to the structure of general Internet traffic. The obtained traffic exhibits negative and positive correlations, anti-persistence, and its distribution function is skewed to the right. Our second contribution is an approximation of the traffic by ARIMA/FARIMA processes blue and artificial neural networks. As we show, the obtained traffic models are able to enhance the performance of an adaptive streaming algorithm.  相似文献   

17.
网络服务质量评估体系研究   总被引:3,自引:0,他引:3  
刘玉军 《计算机工程与设计》2005,26(5):1250-1252,1289
讨论了QoS中的一项关键技术,即网络服务质量评估技术。基于SLA的核心思想,提出一个QoS评估模型,从6个方面描述了评估体系模型的构成。根据内容提供商、网络运营商、其它服务提供商和用户所处位置的不同,定义了两种网络性能参数的采集方法。给出业务分层和SLA服务性能指标的对应关系。以SLA高层应用为例详细介绍了6个性能指标的计算方法。  相似文献   

18.
《Computer Networks》2008,52(15):2961-2974
Inter-ISP traffic flow determines the settlement between ISPs and affects the perceived performance of ISP services. In today’s Internet, the inter-ISP traffic flow patterns are controlled not only by ISPs’ policy-based routing configuration and traffic engineering, but also by application layer routing. The goal of this paper is to study the economic implications of this shift in Internet traffic control assuming rational ISPs and subscribers. For this purpose, we build a general traffic model that predicts traffic patterns based on subscriber distribution and abstract traffic controls such as caching functions and performance sensitivity functions. We also build a game–theoretic model of subscribers picking ISPs, and ISPs making provisioning and peering decisions. In particular, we apply this to a local market where two ISPs compete for market share of subscribers under two traffic patterns: “Web” and “P2P overlay”, that typifies the transition the current Internet is going through. Our methodology can be used to quantitatively demonstrate that (1) while economy of scale is the predominant property of the competitive ISP market, P2P traffic may introduce unfair distribution of peering benefit (i.e. free-riding); (2) the large ISP can restore more fairness by reducing its private capacity (bandwidth throttling), which has the drawback of hurting business growth; and (3) ISPs can reduce the level of peering (e.g. by reducing peering bandwidth) to restore more fairness, but this has the side-effect of also reducing the ISPs’ collective bargaining power towards subscribers.  相似文献   

19.
随着Internet的快速发展和宽带网络的普及,点对点(P2P)和点对服务器和点技术(P2sP)应用越来越受用户欢迎,但这类应用占用大量网络带宽并在很大程度上改变了网络的流量模型,使原来流畅的网络变得越来越拥塞。为进行识别并限制其流量,介绍了P2P相关技术应用现状及其流量识别研究的基础上,分析了几种典型的流量识别技术,对该技术的发展趋势作了初步探讨。  相似文献   

20.
Applications using Transmission Control Protocol (TCP), such as web-browsers, ftp, and various peer-to-peer (P2P) programs, dominate most of the Internet traffic today. In many cases, users have bandwidth-limited last mile connections to the Internet which act as network bottlenecks. Users generally run multiple concurrent networking applications that compete for the scarce bandwidth resource. Standard TCP shares bottleneck link capacity according to connection round-trip time (RTT), and consequently may result in a bandwidth partition which does not necessarily coincide with the user's desires. In this work, we present a receiver-based bandwidth sharing system (BWSS) for allocating the capacity of last-hop access links according to user preferences. Our system does not require modifications to the TCP protocol, network infrastructure or sending hosts, making it easy to deploy. By breaking fairness between flows on the access link, the BWSS can limit the throughput fluctuations of high-priority applications. We utilize the BWSS to perform efficient video streaming over TCP to receivers with bandwidth-limited last mile connections. We demonstrate the effectiveness of our proposed system through Internet experiments.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号