2012
DOI: 10.1109/tnet.2012.2190093
|View full text |Cite
|
Sign up to set email alerts
|

The Internet-Wide Impact of P2P Traffic Localization on ISP Profitability

Abstract: We conduct a detailed simulation study to examine the impact of localizing P2P traffic within network boundaries on an ISP's profitability. A distinguishing aspect of our work is the focus on Internet-wide implications, i.e., how adoption of localization within an ISP affects both itself and other ISPs. Our simulations are based on detailed models of inter-AS P2P traffic and inter-AS routing, localization models that can predict the extent to which P2P traffic is reduced, and pricing models to predict the impa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 34 publications
0
9
0
Order By: Relevance
“…After solving (11) by the subgradient method, we obtain the distributed algorithm to solve (9), which is the interactive optimization algorithm of ISPs and P2P applications. In other words, P2P applications and ISPs can solve the subproblems (14) and (13) independently at first and then transfer the optimal solutiont k ands e to iTracker.…”
Section: Liu Y Et Al Sci China Inf Scimentioning
confidence: 99%
“…After solving (11) by the subgradient method, we obtain the distributed algorithm to solve (9), which is the interactive optimization algorithm of ISPs and P2P applications. In other words, P2P applications and ISPs can solve the subproblems (14) and (13) independently at first and then transfer the optimal solutiont k ands e to iTracker.…”
Section: Liu Y Et Al Sci China Inf Scimentioning
confidence: 99%
“…At the macro level, the traffic between two ASes depends on the number of users and the popularity of the content hosted within those ASes. The common gravity models [9], [19] operate at this level. This level of description is insufficient to capture more elusive aspects of the traffic, namely what happens at the application level.…”
Section: A Traffic Modelmentioning
confidence: 99%
“…In recent years, the crack down on the use of P2P has forced P2P applications to find out alternate ways (port masquerading, relays, tunnelling, encryption etc) to hide their traffic on the network. While there is an evidence that P2P traffic is decreasing [5], it still represents a significant fraction of the Internet traffic, and is perceived as wasteful of network resources [6].…”
Section: Introductionmentioning
confidence: 99%