2009
DOI: 10.1007/978-3-642-03869-3_53
|View full text |Cite
|
Sign up to set email alerts
|

Zero-Day Reconciliation of BitTorrent Users with Their ISPs

Abstract: Abstract. BitTorrent users and consumer ISPs are often pictured as having opposite interests, with end-users aggressively trying to improve their download times, while ISPs throttle this traffic to reduce their costs. However, inefficiencies in both download time and quantity of long-distance traffic originate in BitTorrent randomly selecting peers to interact with. We show that biasing the link selection allows one to reduce both median download times by up to 32% and long-distance traffic by up to 16%. This … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2012
2012

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Regarding the reduction of ISP costs, multiple solutions have been proposed. Examples include ISP peering , IP multicast, content distribution networks and P2P localisation [6], [13], [14]. Another technique that has received increased attention from the research community is traffic shaping, that relies on reducing peak traffic volumes.…”
Section: Related Workmentioning
confidence: 99%
“…Regarding the reduction of ISP costs, multiple solutions have been proposed. Examples include ISP peering , IP multicast, content distribution networks and P2P localisation [6], [13], [14]. Another technique that has received increased attention from the research community is traffic shaping, that relies on reducing peak traffic volumes.…”
Section: Related Workmentioning
confidence: 99%
“…BitTorrent traffic is responsible for a large portion of the overall Internet traffic. Accordingly, a lot of attention has been devoted to optimizing BitTorrent clients, for example, to make them ISP friendly, via localizing data traffic [1]. However, these works have focused on traffic volume almost exclusively.…”
Section: Introductionmentioning
confidence: 99%