DocumentCode :
3537081
Title :
LHCDS: A Novel Deployment Strategy of Proxy Caches for P2P Traffic in ISP Networks
Author :
Zhai, Haibin ; Jiang, Hai ; Sun, Yi ; Li, Jun ; Liu, Jing ; Fang, Gengfa ; Dutkiewicz, Eryk
Author_Institution :
Inst. of Comput. Technol., Chinese Acad. of Sci., Beijing, China
fYear :
2011
fDate :
Aug. 31 2011-Sept. 2 2011
Firstpage :
224
Lastpage :
230
Abstract :
Peer-to-Peer (P2P) systems have brought two serious problems for Internet Services Providers (ISPs): traffic surges and network congestion. Proxy caching for P2P traffic is an effective means of easing the burden imposed by P2P traffic on ISPs. The deployment strategy of proxy caches has a significant impact on their effect on ISPs. It has two important components: one is cache operation that is what P2P traffic caches monitor and serve, the other is cache deployment algorithm that is where to deploy caches. In this paper, we propose a deployment strategy of proxy caches, called LHCDS (Cache Deployment Strategy for Lower and Higher networks), including a new type of cache operation and its corresponding deployment algorithm. It can serve P2P traffic not only from the local lower access network to the higher transit ISP´s network but also within the higher transit ISP´s network itself. In LHCDS, caches are deployed at or near core routers of the transit ISP. We develop several deployment algorithms based on the new cache operation. We then evaluate the algorithms, and conclude that the proposed greedy algorithm is a viable and practical algorithm whose performance is close to optimal. Experiments also show that ISPs can achieve more P2P traffic decrease on links using LHCDS than previous strategies.
Keywords :
Internet; cache storage; peer-to-peer computing; telecommunication congestion control; telecommunication traffic; ISP networks; Internet services providers; LHCDS; P2P traffic; network congestion; novel deployment strategy; peer-to-peer systems; proxy caching; traffic surges; Greedy algorithms; Heuristic algorithms; Mathematical model; Monitoring; Network topology; Peer to peer computing; Software algorithms; cache deployment strategy; peer-to-peer network; proxy cache;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer and Information Technology (CIT), 2011 IEEE 11th International Conference on
Conference_Location :
Pafos
Print_ISBN :
978-1-4577-0383-6
Electronic_ISBN :
978-0-7695-4388-8
Type :
conf
DOI :
10.1109/CIT.2011.15
Filename :
6036757
Link To Document :
بازگشت