Research Article

Improving Control over Inter ISP Traffic Volume and Enhancing Peer Selection Methodology

by  Mudassar Nawaz, Aftab Hussain, Faisal Shahzad
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 141 - Issue 5
Published: May 2016
Authors: Mudassar Nawaz, Aftab Hussain, Faisal Shahzad
10.5120/ijca2016909622
PDF

Mudassar Nawaz, Aftab Hussain, Faisal Shahzad . Improving Control over Inter ISP Traffic Volume and Enhancing Peer Selection Methodology. International Journal of Computer Applications. 141, 5 (May 2016), 20-27. DOI=10.5120/ijca2016909622

                        @article{ 10.5120/ijca2016909622,
                        author  = { Mudassar Nawaz,Aftab Hussain,Faisal Shahzad },
                        title   = { Improving Control over Inter ISP Traffic Volume and Enhancing Peer Selection Methodology },
                        journal = { International Journal of Computer Applications },
                        year    = { 2016 },
                        volume  = { 141 },
                        number  = { 5 },
                        pages   = { 20-27 },
                        doi     = { 10.5120/ijca2016909622 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2016
                        %A Mudassar Nawaz
                        %A Aftab Hussain
                        %A Faisal Shahzad
                        %T Improving Control over Inter ISP Traffic Volume and Enhancing Peer Selection Methodology%T 
                        %J International Journal of Computer Applications
                        %V 141
                        %N 5
                        %P 20-27
                        %R 10.5120/ijca2016909622
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Modern day internet communication has evolved due to advance application layers software. These application layer software use distinct protocols like TCP, HTTP and SMTP, etc. to carry out unicast, broadcast and non-broadcast (multicast) network protocols in order to meet customers’ demand. Then there are peer to peer and non-peer to peer services. During recent times, peer to peer communication has grabbed a huge chunk of internet communication which engages a lot of network resources. Downloading and uploading with peer to peer connectivity has become a major problem for ISPs to handle. They simply choke networks and especially cross ISP links. In the wake of these problems, ISPs have enabled their systems with certain policies which are translated as limitations. Technologists and engineers have formulated applications that cooperate with ISPs to establish a harmony by not exceeding the limits. Yet there is a huge demand by ISPs to make software developers cognizant of network constraints during software development. Most of the techniques use a collaborative mechanism in which signaling between ISP and End system takes place for the purpose. However these techniques have their scenarios in which they work. This research makes use of multiple limitation techniques to bring down the inter-ISP traffic transpiring a reduction in cost. The ISP-Application resources are the same but a hybrid and dynamic system is attempted in this research to reduce traffic and cost along with helping peers with better experience.

References
  • Camus (2012). Routed Versus Routing Protocols 1. Retrieved May 2014, from http://cpe.rmutt.ac.th/network/images/cn/Chapter%205%20IP%20Routing.pdf
  • Editorial (2013, October). Voice over IP 2: the expert view. Retrieved May 2014, from http://www.computerweekly.com/feature/Voice-over-IP-the-expert-view
  • Bradely (2012, May). Types of Networks - LAN WAN MAN and Area Networks. Retrieved May 2014,from http://compnetworking.about.com/od/basicnetworkingconcepts/a/network_types.htm
  • Konstantinos (2010). Challenges in Cooperation between Internet Service Providers and Peer-to-Peer Application. Retrieved from http://www.doc.ic.ac.uk/teaching/distinguished-projects/2010/k.gkerpinis.pdf
  • Mitchel (2013, February). HTG Explains: What’s the Difference Between Ad-Hoc and Infrastructure Mode? Retrieved from http://www.howtogeek.com/180649/htg-explains-whats-the-difference-between-ad-hoc-and-infrastructure-mode/
  • Ammar (2011). HTG Explains: What’s the Difference Between Ad-Hoc and Infrastructure Mode? Retrieved from http://www.howtogeek.com/180649/htg-explains-whats-the-difference-between-ad-hoc-and-infrastructure-mode/ 6
  • Technet Microsoft (2010). Port Assignments for Well-Known Ports . Retrieved from http://technet.microsoft.com/en-us/library/cc959828.aspx
  • Rouse (2010). What is dynamic port numbers (private port numbers)? - Definition from WhatIs.com. Retrieved from http://searchnetworking.techtarget.com/definition/dynamic-port-numbers
  • Microsoft (2010). The OSI Model's Seven Layers Defined and Functions Explained. Retrieved from http://support.microsoft.com/kb/103884
  • TCP Guide (2012). The TCP/IP Guide - OSI Reference Model Layer Summary. Retrieved from http://www.tcpipguide.com/free/t_OSIReferenceModelLayerSummary.htm
  • IRCB (2008). Routing and Switching 15. Retrieved from http://www.ircbeginner.com/ircinfo/Routing_Article.pdf
  • Schluting (2012). Networking 101: Understanding RIP Routing. Retrieved from http://www.enterprisenetworkingplanet.com/netsp/article.php/3609151/Networking-101-Understanding-RIP-Routing.htm
  • CISCO (2013). Introduction to EIGRP - Cisco. Retrieved from http://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/13669-1.html
  • P2P caching - Wikipedia, the free encyclopedia. (n.d.). Retrieved May 16, 2014, from http://en.wikipedia.org/wiki/P2P_caching
  • Ohio University (2012). Overlay Networks. Retrieved from http://www.cse.ohio-state.edu/hpcs/WWW/HTML/internet-p2p.html
  • Gyorgy (2008). Cooperative Caching and Relaying Strategies for Peer-to-peer Content Delivery. Retrieved from http://www.cs.toronto.edu/iptps2008/final/48.pdf
  • Saumitra (2013). ALTO: A Multi Dimensional Peer Selection Problem. Retrieved from http://www.ietf.org/proceedings/73/slides/alto-4.pdf
  • White Paper, “Management Peer-to-Peer traffic with Cisco service Control Technology”, http://www.cisco.com/en/US/prod/collateral/ps7045/ps6129/ps6133/ps6150/prod_white_paper0900aecd8023500d.html
  • V. Aggarwalet al., “Can ISPs and P2P Users Cooperate for Improved Performance?”, ACM CCR, Vol. 37, No. 3, pp.
  • D.R. Choffnes et al., “Taming the Torrent: A Practical Approach to Reducing Cross-ISPTraffic in P2P Systems”, ACM CCR, Vol. 38, No. 4, pp. 363-374, Oct. 2008
  • SopCast (2009), http://www.sopcast.com
  • György, (2011), Interaction Patterns between P2P Content Distribution Systems and ISPs, Piotr Cholda and Rafal Stankiewicz, AGH University of Science and Technology Ioanna Papafili and George D. Stamoulis, Athens University of Economics and Business
  • R. Bindal et al., “Improving Traffic Locality in BitTorrent via Biased Neighbor Selection,” Proc. 26th IEEE Int’l. Conf. Distributed Computing Systems (ICDCS), 2006, pp. 66-76.
  • M. Castro et al., “Topology-Aware Routing in Structured Peer-to-Peer Overlay Networks, Tech. Rep. MSRTR- 2002-82,” 2002. Available: citeseer.ist.psu.edu/ castro02topologyaware.html.
  • Chaojiong, (2010), IEEE, A Dynamic Peer-to-Peer Traffic Limiting Policy for ISP Networks
  • G. Dán,(2012) “Cache-to-Cache: Could ISPs Cooperate to Decrease Peer-to-Peer Content Distribution Costs?” IEEE Trans. Parallel and Distr. Syst., to appear
  • M. Merrit, D. Pasko, and L. Popkin,(2008) “Network-Friendly Peer-to-Peer Services,” Proc. IETF Wksp. P2P Infrastructures, May 2008.
  • L. Qiu et al., “On Selfish Routing in Internet-Like Environments” Proc. ACM SIGCOMM 2003
  • H. Xie et al., “P4P: Provider Portal for Applications”, Proc. ACM SIGCOMM 2008
  • Lijie Sheng “Reducing Cross-Network Traffic in P2P Systems via Localized Neighbor Selection” 10.1109/CHINACOM.2009.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

peer to peer P2P

Powered by PhDFocusTM