A. M. Guirado-Puerta, J. Malgosa-Sanahuja, J. García-Haro, P. Manzanares-Lopez, J. Sánchez-Aarnoutse
{"title":"机构网络中的点对点流量测量、分析和管理","authors":"A. M. Guirado-Puerta, J. Malgosa-Sanahuja, J. García-Haro, P. Manzanares-Lopez, J. Sánchez-Aarnoutse","doi":"10.1109/IPOM.2004.1547612","DOIUrl":null,"url":null,"abstract":"Peer-to-peer (P2P) file-sharing applications are drastically changing the role of the Internet service providers (ISP) and institutional networks. This key reason is an unexpected and indiscriminate network bandwidth use that breaks the balance between costs and benefits. In addition, legal issues must be considered due to piracy associated with P2P applications. P2P effects are especially harmful in corporate, institutional and government networks that do not want to assume the responsibility to carry this type of data traffic. This paper presents an extensive analysis of eDonkey protocol that is one of the most popular P2P protocols. The analysis is focused on studying those important characteristics that allow understanding its behavior. A methodology to identify efficiently the associated TCP flows is also proposed. As a result, a mechanism based on spoofing TCP reset packets is tested to mitigate the eDonkey traffic effects and alleviate the network load.","PeriodicalId":197627,"journal":{"name":"2004 IEEE International Workshop on IP Operations and Management","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Peer-to-peer traffic measurement, analysis and management in an institutional network\",\"authors\":\"A. M. Guirado-Puerta, J. Malgosa-Sanahuja, J. García-Haro, P. Manzanares-Lopez, J. Sánchez-Aarnoutse\",\"doi\":\"10.1109/IPOM.2004.1547612\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Peer-to-peer (P2P) file-sharing applications are drastically changing the role of the Internet service providers (ISP) and institutional networks. This key reason is an unexpected and indiscriminate network bandwidth use that breaks the balance between costs and benefits. In addition, legal issues must be considered due to piracy associated with P2P applications. P2P effects are especially harmful in corporate, institutional and government networks that do not want to assume the responsibility to carry this type of data traffic. This paper presents an extensive analysis of eDonkey protocol that is one of the most popular P2P protocols. The analysis is focused on studying those important characteristics that allow understanding its behavior. A methodology to identify efficiently the associated TCP flows is also proposed. As a result, a mechanism based on spoofing TCP reset packets is tested to mitigate the eDonkey traffic effects and alleviate the network load.\",\"PeriodicalId\":197627,\"journal\":{\"name\":\"2004 IEEE International Workshop on IP Operations and Management\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-10-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2004 IEEE International Workshop on IP Operations and Management\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IPOM.2004.1547612\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2004 IEEE International Workshop on IP Operations and Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IPOM.2004.1547612","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Peer-to-peer traffic measurement, analysis and management in an institutional network
Peer-to-peer (P2P) file-sharing applications are drastically changing the role of the Internet service providers (ISP) and institutional networks. This key reason is an unexpected and indiscriminate network bandwidth use that breaks the balance between costs and benefits. In addition, legal issues must be considered due to piracy associated with P2P applications. P2P effects are especially harmful in corporate, institutional and government networks that do not want to assume the responsibility to carry this type of data traffic. This paper presents an extensive analysis of eDonkey protocol that is one of the most popular P2P protocols. The analysis is focused on studying those important characteristics that allow understanding its behavior. A methodology to identify efficiently the associated TCP flows is also proposed. As a result, a mechanism based on spoofing TCP reset packets is tested to mitigate the eDonkey traffic effects and alleviate the network load.