DocumentCode
3537081
Title
LHCDS: A Novel Deployment Strategy of Proxy Caches for P2P Traffic in ISP Networks
Author
Zhai, Haibin ; Jiang, Hai ; Sun, Yi ; Li, Jun ; Liu, Jing ; Fang, Gengfa ; Dutkiewicz, Eryk
Author_Institution
Inst. of Comput. Technol., Chinese Acad. of Sci., Beijing, China
fYear
2011
fDate
Aug. 31 2011-Sept. 2 2011
Firstpage
224
Lastpage
230
Abstract
Peer-to-Peer (P2P) systems have brought two serious problems for Internet Services Providers (ISPs): traffic surges and network congestion. Proxy caching for P2P traffic is an effective means of easing the burden imposed by P2P traffic on ISPs. The deployment strategy of proxy caches has a significant impact on their effect on ISPs. It has two important components: one is cache operation that is what P2P traffic caches monitor and serve, the other is cache deployment algorithm that is where to deploy caches. In this paper, we propose a deployment strategy of proxy caches, called LHCDS (Cache Deployment Strategy for Lower and Higher networks), including a new type of cache operation and its corresponding deployment algorithm. It can serve P2P traffic not only from the local lower access network to the higher transit ISP´s network but also within the higher transit ISP´s network itself. In LHCDS, caches are deployed at or near core routers of the transit ISP. We develop several deployment algorithms based on the new cache operation. We then evaluate the algorithms, and conclude that the proposed greedy algorithm is a viable and practical algorithm whose performance is close to optimal. Experiments also show that ISPs can achieve more P2P traffic decrease on links using LHCDS than previous strategies.
Keywords
Internet; cache storage; peer-to-peer computing; telecommunication congestion control; telecommunication traffic; ISP networks; Internet services providers; LHCDS; P2P traffic; network congestion; novel deployment strategy; peer-to-peer systems; proxy caching; traffic surges; Greedy algorithms; Heuristic algorithms; Mathematical model; Monitoring; Network topology; Peer to peer computing; Software algorithms; cache deployment strategy; peer-to-peer network; proxy cache;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer and Information Technology (CIT), 2011 IEEE 11th International Conference on
Conference_Location
Pafos
Print_ISBN
978-1-4577-0383-6
Electronic_ISBN
978-0-7695-4388-8
Type
conf
DOI
10.1109/CIT.2011.15
Filename
6036757
Link To Document