2011
DOI: 10.1007/s12083-010-0098-7
|View full text |Cite
|
Sign up to set email alerts
|

A study on key strategies in P2P file sharing systems and ISPs’ P2P traffic management

Abstract: The flourish of P2P systems draws a lot of attention of networking researchers. Some research efforts focus on P2P systems, trying to understand the mechanism of various implementations and the behavior pattern of P2P users, and then improve the systems' performance. Others look at the issue from the angle of ISPs, trying to help ISPs solve various issues brought by P2P applications. In this article, we conduct a review study on recent research efforts in these two areas. The first part of this article focuses… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 40 publications
0
11
0
Order By: Relevance
“…However, the altered content may be malicious, fake, or corrupt. This affects the network’s quality of service (especially in file, voice, and video-based P2P streaming systems [ 72 , 73 , 75 , 79 , 80 ]), overall system energy consumption [ 74 ], content availability [ 78 ], and data integrity [ 72 ]. Pollution is an easy and fast way to disseminate worms or viruses from one to many peers in the network.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the altered content may be malicious, fake, or corrupt. This affects the network’s quality of service (especially in file, voice, and video-based P2P streaming systems [ 72 , 73 , 75 , 79 , 80 ]), overall system energy consumption [ 74 ], content availability [ 78 ], and data integrity [ 72 ]. Pollution is an easy and fast way to disseminate worms or viruses from one to many peers in the network.…”
Section: Resultsmentioning
confidence: 99%
“…Therefore, pollution can have an exponential impact on the security of the entire network [ 72 ]. The pollution attack was first discovered in 2005, where a crawler was used to retrieve super peers in the KaZaA P2P network [ 73 ]. Analysis of the contents collected by the crawler revealed that over 50% of welcome copies (ie, introductory files for a collection of files) for musical files in the KaZaA network were polluted [ 73 ].…”
Section: Resultsmentioning
confidence: 99%
“…In [47], the authors review some important techniques for ISPs in order to manage P2P traffic. They show how to perform blocking, caching and localization, and, moreover, they compare their advantages and disadvantages.…”
Section: Network Protocols and Algorithmsmentioning
confidence: 99%
“…survey the P2P traffic optimization technologies from three aspects: P2P cache, traffic locality-awareness and data scheduling [1]. Literature [2] summarizes ISPs' P2P traffic management schemes: p2p blocking, p2p caching, Localization (peers), Localization (ISPs). In order to minimize the total amount of P2P traffic, Noriaki Kamiyama etc.…”
Section: Introductionmentioning
confidence: 99%