CFP last date
20 January 2025
Reseach Article

Improving Control over Inter ISP Traffic Volume and Enhancing Peer Selection Methodology

by Mudassar Nawaz, Aftab Hussain, Faisal Shahzad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 141 - Number 5
Year of Publication: 2016
Authors: Mudassar Nawaz, Aftab Hussain, Faisal Shahzad
10.5120/ijca2016909622

Mudassar Nawaz, Aftab Hussain, Faisal Shahzad . Improving Control over Inter ISP Traffic Volume and Enhancing Peer Selection Methodology. International Journal of Computer Applications. 141, 5 ( May 2016), 20-27. DOI=10.5120/ijca2016909622

@article{ 10.5120/ijca2016909622,
author = { Mudassar Nawaz, Aftab Hussain, Faisal Shahzad },
title = { Improving Control over Inter ISP Traffic Volume and Enhancing Peer Selection Methodology },
journal = { International Journal of Computer Applications },
issue_date = { May 2016 },
volume = { 141 },
number = { 5 },
month = { May },
year = { 2016 },
issn = { 0975-8887 },
pages = { 20-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume141/number5/24781-2016909622/ },
doi = { 10.5120/ijca2016909622 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:42:40.668378+05:30
%A Mudassar Nawaz
%A Aftab Hussain
%A Faisal Shahzad
%T Improving Control over Inter ISP Traffic Volume and Enhancing Peer Selection Methodology
%J International Journal of Computer Applications
%@ 0975-8887
%V 141
%N 5
%P 20-27
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Modern day internet communication has evolved due to advance application layers software. These application layer software use distinct protocols like TCP, HTTP and SMTP, etc. to carry out unicast, broadcast and non-broadcast (multicast) network protocols in order to meet customers’ demand. Then there are peer to peer and non-peer to peer services. During recent times, peer to peer communication has grabbed a huge chunk of internet communication which engages a lot of network resources. Downloading and uploading with peer to peer connectivity has become a major problem for ISPs to handle. They simply choke networks and especially cross ISP links. In the wake of these problems, ISPs have enabled their systems with certain policies which are translated as limitations. Technologists and engineers have formulated applications that cooperate with ISPs to establish a harmony by not exceeding the limits. Yet there is a huge demand by ISPs to make software developers cognizant of network constraints during software development. Most of the techniques use a collaborative mechanism in which signaling between ISP and End system takes place for the purpose. However these techniques have their scenarios in which they work. This research makes use of multiple limitation techniques to bring down the inter-ISP traffic transpiring a reduction in cost. The ISP-Application resources are the same but a hybrid and dynamic system is attempted in this research to reduce traffic and cost along with helping peers with better experience.

References
  1. Camus (2012). Routed Versus Routing Protocols 1. Retrieved May 2014, from http://cpe.rmutt.ac.th/network/images/cn/Chapter%205%20IP%20Routing.pdf
  2. Editorial (2013, October). Voice over IP 2: the expert view. Retrieved May 2014, from http://www.computerweekly.com/feature/Voice-over-IP-the-expert-view
  3. Bradely (2012, May). Types of Networks - LAN WAN MAN and Area Networks. Retrieved May 2014,from http://compnetworking.about.com/od/basicnetworkingconcepts/a/network_types.htm
  4. Konstantinos (2010). Challenges in Cooperation between Internet Service Providers and Peer-to-Peer Application. Retrieved from http://www.doc.ic.ac.uk/teaching/distinguished-projects/2010/k.gkerpinis.pdf
  5. Mitchel (2013, February). HTG Explains: What’s the Difference Between Ad-Hoc and Infrastructure Mode? Retrieved from http://www.howtogeek.com/180649/htg-explains-whats-the-difference-between-ad-hoc-and-infrastructure-mode/
  6. Ammar (2011). HTG Explains: What’s the Difference Between Ad-Hoc and Infrastructure Mode? Retrieved from http://www.howtogeek.com/180649/htg-explains-whats-the-difference-between-ad-hoc-and-infrastructure-mode/ 6
  7. Technet Microsoft (2010). Port Assignments for Well-Known Ports . Retrieved from http://technet.microsoft.com/en-us/library/cc959828.aspx
  8. Rouse (2010). What is dynamic port numbers (private port numbers)? - Definition from WhatIs.com. Retrieved from http://searchnetworking.techtarget.com/definition/dynamic-port-numbers
  9. Microsoft (2010). The OSI Model's Seven Layers Defined and Functions Explained. Retrieved from http://support.microsoft.com/kb/103884
  10. TCP Guide (2012). The TCP/IP Guide - OSI Reference Model Layer Summary. Retrieved from http://www.tcpipguide.com/free/t_OSIReferenceModelLayerSummary.htm
  11. IRCB (2008). Routing and Switching 15. Retrieved from http://www.ircbeginner.com/ircinfo/Routing_Article.pdf
  12. Schluting (2012). Networking 101: Understanding RIP Routing. Retrieved from http://www.enterprisenetworkingplanet.com/netsp/article.php/3609151/Networking-101-Understanding-RIP-Routing.htm
  13. CISCO (2013). Introduction to EIGRP - Cisco. Retrieved from http://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/13669-1.html
  14. P2P caching - Wikipedia, the free encyclopedia. (n.d.). Retrieved May 16, 2014, from http://en.wikipedia.org/wiki/P2P_caching
  15. Ohio University (2012). Overlay Networks. Retrieved from http://www.cse.ohio-state.edu/hpcs/WWW/HTML/internet-p2p.html
  16. Gyorgy (2008). Cooperative Caching and Relaying Strategies for Peer-to-peer Content Delivery. Retrieved from http://www.cs.toronto.edu/iptps2008/final/48.pdf
  17. Saumitra (2013). ALTO: A Multi Dimensional Peer Selection Problem. Retrieved from http://www.ietf.org/proceedings/73/slides/alto-4.pdf
  18. White Paper, “Management Peer-to-Peer traffic with Cisco service Control Technology”, http://www.cisco.com/en/US/prod/collateral/ps7045/ps6129/ps6133/ps6150/prod_white_paper0900aecd8023500d.html
  19. V. Aggarwalet al., “Can ISPs and P2P Users Cooperate for Improved Performance?”, ACM CCR, Vol. 37, No. 3, pp.
  20. D.R. Choffnes et al., “Taming the Torrent: A Practical Approach to Reducing Cross-ISPTraffic in P2P Systems”, ACM CCR, Vol. 38, No. 4, pp. 363-374, Oct. 2008
  21. SopCast (2009), http://www.sopcast.com
  22. György, (2011), Interaction Patterns between P2P Content Distribution Systems and ISPs, Piotr Cholda and Rafal Stankiewicz, AGH University of Science and Technology Ioanna Papafili and George D. Stamoulis, Athens University of Economics and Business
  23. R. Bindal et al., “Improving Traffic Locality in BitTorrent via Biased Neighbor Selection,” Proc. 26th IEEE Int’l. Conf. Distributed Computing Systems (ICDCS), 2006, pp. 66-76.
  24. M. Castro et al., “Topology-Aware Routing in Structured Peer-to-Peer Overlay Networks, Tech. Rep. MSRTR- 2002-82,” 2002. Available: citeseer.ist.psu.edu/ castro02topologyaware.html.
  25. Chaojiong, (2010), IEEE, A Dynamic Peer-to-Peer Traffic Limiting Policy for ISP Networks
  26. G. Dán,(2012) “Cache-to-Cache: Could ISPs Cooperate to Decrease Peer-to-Peer Content Distribution Costs?” IEEE Trans. Parallel and Distr. Syst., to appear
  27. M. Merrit, D. Pasko, and L. Popkin,(2008) “Network-Friendly Peer-to-Peer Services,” Proc. IETF Wksp. P2P Infrastructures, May 2008.
  28. L. Qiu et al., “On Selfish Routing in Internet-Like Environments” Proc. ACM SIGCOMM 2003
  29. H. Xie et al., “P4P: Provider Portal for Applications”, Proc. ACM SIGCOMM 2008
  30. Lijie Sheng “Reducing Cross-Network Traffic in P2P Systems via Localized Neighbor Selection” 10.1109/CHINACOM.2009.
Index Terms

Computer Science
Information Sciences

Keywords

peer to peer P2P