Modeling and performance analysis of BitTorrent-like peer-to-peer networks
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Improving Traffic Locality in BitTorrent via Biased Neighbor Selection
ICDCS '06 Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
Should internet service providers fear peer-assisted content distribution?
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
P4p: provider portal for applications
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Hi-index | 0.00 |
Despite their widespread popularity, peer-to-peer (P2P) systems engender continuing controversy. To reduce P2P's high network cost, Internet Service Providers (ISPs) have installed network devices that detect and block P2P traffic. These devices angered subscribers because they also increased download times. For that reason, application developers have begun obfuscating their traffic to avoid ISP-detection. This "cat and mouse" game portends a broader shift. If ISPs remedy the relationship with P2P developers now, developers may cooperate with them to develop network-efficient protocols in the future. Our proposal makes a noteworthy contribution in this direction.