skip to main content
research-article

Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems

Published:17 August 2008Publication History
Skip Abstract Section

Abstract

Peer-to-peer (P2P) systems, which provide a variety of popular services, such as file sharing, video streaming and voice-over-IP, contribute a significant portion of today's Internet traffic. By building overlay networks that are oblivious to the underlying Internet topology and routing, these systems have become one of the greatest traffic-engineering challenges for Internet Service Providers (ISPs) and the source of costly data traffic flows. In an attempt to reduce these operational costs, ISPs have tried to shape, block or otherwise limit P2P traffic, much to the chagrin of their subscribers, who consistently finds ways to eschew these controls or simply switch providers.

In this paper, we present the design, deployment and evaluation of an approach to reducing this costly cross-ISP traffic without sacrificing system performance. Our approach recycles network views gathered at low cost from content distribution networks to drive biased neighbor selection without any path monitoring or probing. Using results collected from a deployment in BitTorrent with over 120,000 users in nearly 3,000 networks, we show that our lightweight approach significantly reduces cross-ISP traffic and, over 33% of the time, it selects peers along paths that are within a single autonomous system (AS). Further, we find that our system locates peers along paths that have two orders of magnitude lower latency and 30% lower loss rates than those picked at random, and that these high-quality paths can lead to significant improvements in transfer rates. In challenged settings where peers are overloaded in terms of available bandwidth, our approach provides 31% average download-rate improvement; in environments with large available bandwidth, it increases download rates by 207% on average (and improves median rates by 883%

References

  1. ADLER, M., KUMARY, R., ROSSZ, K., RUBENSTEIN, D., SUEL, T., AND YAOK, D. D. Optimal peer selection for P2P downloading and streaming. In Proc. of IEEE INFOCOM (2005).Google ScholarGoogle ScholarCross RefCross Ref
  2. AGGARWAL, V., BENDER, S., FELDMANN, A., AND WICHMANN, A. Methodology for estimating network distances of Gnutella neighbors. In Workshop on Algorithms and Protocols for Efficient Peer-to-Peer Applications at Informatik (2004).Google ScholarGoogle Scholar
  3. AGGARWAL, V., FELDMANN, A., AND SCHEIDELER, C. Can ISPs and P2P users cooperate for improved performance? SIGCOMM Comput. Commun. Rev. 37, 3 (2007), 29--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. AKAMAI. Akamai CDN. http://www.akamai.com.Google ScholarGoogle Scholar
  5. AKAMAI. Sureroute, May 2003. http://www.akamai.com/dl/feature_sheets/fs_edgesuite_sureroute.pdf.Google ScholarGoogle Scholar
  6. AKAMAI. Akamai introduces first-of-its-kind, real-time view into health of the Internet, June 2007. http://www.akamai.com/html/about/press/Google ScholarGoogle Scholar
  7. AKELLA, A., SESHAN, S., AND SHAIKH, A. An empirical evaluation of wide-area internet bottlenecks. In Proc. of the Internet Measurement Conference (IMC) (2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. BINDAL, R., CAO, P., CHAN, W., MEDVED, J., SUWALA, G., BATES, T., AND ZHANG, A. Improving traffic locality in BitTorrent via biased neighbor selection. In Proc. of the Int'l Conference on Distributed Computing Systems (ICDCS) (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. COHEN, B. Incentives build robustness in BitTorrent. In Proc. of the Workshop on Economics of Peer-to-Peer Systems (P2PEcon) (2003).Google ScholarGoogle Scholar
  10. DABEK, COX, KAASHOEK, AND MORRIS, R. Vivaldi: A decentralized network coordinate system. In Proc. of ACM SIGCOMM (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. DAWSON, K. FCC seeks comment in Comcast P2P investigation, January 2007. http://yro.slashdot.org/yro/08/01/16/0238244.shtml.Google ScholarGoogle Scholar
  12. GUMMADI, K., GUMMADI, R., GRIBBLE, S., RATNASAMY, S., SHENKER, S., AND STOICA, I. The impact of DHT routing geometry on resilience and proximity. In Proc. of ACM SIGCOMM (2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. GUO, L., CHEN, S., XIAO, Z., TAN, E., DING, X., AND ZHANG, X. Measurements, analysis, and modeling of BitTorrent-like systems. In Proc. of the Internet Measurement Conference (IMC) (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. IPOQUE. Internet Study 2007: Data about P2P, VoIP, Skype, file hosters like RapidShare and streaming services like YouTube, November 2007. http://www.ipoque.com/media/internet_studies/internet_study_2007.Google ScholarGoogle Scholar
  15. IZAL, M., URVOY-KELLER, G., BIERSACK, E., FELBER, P., HAMRA, A., AND GARCES--ERICE, L. Dissecting BitTorrent: Five months in a torrent's lifetime. In Proc. of Passive and Active Measurement Workshop (PAM) (2004).Google ScholarGoogle ScholarCross RefCross Ref
  16. KANGASHARJU, J., ROSS, K., AND ROBERTS, J. Performance evaluation of redirection schemes in content distribution networks. Computer Communications 24, 2 (2001), 207---214. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. KARAGIANNIS, T., RODRIGUEZ, P., AND PAPAGIANNAKI, K. Should internet service providers fear peer-assisted content distribution? In Proc. of the Internet Measurement Conference (IMC) (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. LI, J., AND SOLLINS, K. Exploiting autonomous system information in structured peer-to-peer networks. In ICCCN (2004).Google ScholarGoogle Scholar
  19. LIMELIGHT NETWORKS. Limelight networks CDN. http://www.limelightnetworks.com.Google ScholarGoogle Scholar
  20. MADHYASTHA, H. V., ISDAL, T., MICHAEL PIATEK, DIXON, C., ANDERSON, T., KIRSHNAMURTHY, A., AND VENKATARAMANI, A. iPlane: an information plane for distributed systems. In Proc. of the USENIX Operating Systems Design and Implementation (OSDI) (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. MENNECKE, T. DSL broadband providers perform balancing act. http://www.slyck.com/news.php?story=973, November 2005.Google ScholarGoogle Scholar
  22. MIRROR IMAGE. Mirror image CDN. http://www.mirror-image.net.Google ScholarGoogle Scholar
  23. NAKAO, A., PETERSON, L., AND BAVIER, A. A routing underlay for overlay networks. In Proc. of ACM SIGCOMM (August 2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. NG, T., AND ZHANG, H. Predicting Internet network distace with coordinates-based approaches. In Proc. of IEEE INFOCOM (2002).Google ScholarGoogle ScholarCross RefCross Ref
  25. POUWELSE, J. A., GARBACKI, P., EPEMA, D. H. J., AND SIPS, H. J. The Bittorrent P2P file-sharing system: Measurements and analysis. In Proc. of the International Workshop on Peer-to-Peer Systems (IPTPS) (Feb 2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. QIU, D., AND SRIKANT, R. Modeling and performance analysis of BitTorrent-like peer-to-peer networks. In Proc. of ACM SIGCOMM (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. SALTON, G., AND MCGILL, M. J. Introduction to modern information retrieval. McGraw-Hill, New York, NY, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. SANDVINE. Sandvine incorporated: Peer-to-peer policy management, 2008. http://www.sandvine.com/solutions/p2p_policy_mngmt.asp.Google ScholarGoogle Scholar
  29. SHAIKH, A., TEWARI, R., AND AGRAWAL, M. On the effectiveness of DNS-based server selection. In Proc. of IEEE INFOCOM (2001).Google ScholarGoogle ScholarCross RefCross Ref
  30. SHANAHAN, K., AND FREEDMAN, M. J. Locality prediction for oblivious clients. In Proc. of the International Workshop on Peer-to-Peer Systems (IPTPS) (Ithaca, NY, 2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. SHEN, G., WANG, Y., XIONG, Y., ZHAO, B. Y., AND ZHANG, Z.-L. HPTP: Relieving the tension between ISPs and P2P. In Proc. of the International Workshop on Peer-to-Peer Systems (IPTPS) (2007).Google ScholarGoogle Scholar
  32. SU, A.-J., CHOFFNES, D., BUSTAMANTE, F. E., AND KUZMANOVIC, A. Relative network positioning via CDN redirections. In Proc. of the Int'l Conference on Distributed Computing Systems (ICDCS) (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. SU, A.-J., CHOFFNES, D. R., KUZMANOVIC, A., AND BUSTAMANTE, F. E. Drafting behind Akamai: Travelocity-based detouring. In Proc. of ACM SIGCOMM (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. TEAM CYMRU. The Team Cymru IP to ASN lookup page. http://www.cymru.com/BGP/asnlookup.html.Google ScholarGoogle Scholar
  35. WELLINGTON, B. dnsjava. http://www.dnsjava.org/.Google ScholarGoogle Scholar
  36. WONG, B., SLIVKINS, A., AND SIRER, E. Meridian: A lightweight network location service without virtual coordinates. In Proc. of ACM SIGCOMM (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. XIE, H., YANG, R., KRISHNAMURTHY, A., LIU, Y., AND SILBERSCHATZ, A. P4P: Provider portal for (P2P) applications. In Proc. of ACM SIGCOMM (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGCOMM Computer Communication Review
        ACM SIGCOMM Computer Communication Review  Volume 38, Issue 4
        October 2008
        436 pages
        ISSN:0146-4833
        DOI:10.1145/1402946
        Issue’s Table of Contents
        • cover image ACM Conferences
          SIGCOMM '08: Proceedings of the ACM SIGCOMM 2008 conference on Data communication
          August 2008
          452 pages
          ISBN:9781605581750
          DOI:10.1145/1402958

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 17 August 2008

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader