• DocumentCode
    3537081
  • Title

    LHCDS: A Novel Deployment Strategy of Proxy Caches for P2P Traffic in ISP Networks

  • Author

    Zhai, Haibin ; Jiang, Hai ; Sun, Yi ; Li, Jun ; Liu, Jing ; Fang, Gengfa ; Dutkiewicz, Eryk

  • Author_Institution
    Inst. of Comput. Technol., Chinese Acad. of Sci., Beijing, China
  • fYear
    2011
  • fDate
    Aug. 31 2011-Sept. 2 2011
  • Firstpage
    224
  • Lastpage
    230
  • Abstract
    Peer-to-Peer (P2P) systems have brought two serious problems for Internet Services Providers (ISPs): traffic surges and network congestion. Proxy caching for P2P traffic is an effective means of easing the burden imposed by P2P traffic on ISPs. The deployment strategy of proxy caches has a significant impact on their effect on ISPs. It has two important components: one is cache operation that is what P2P traffic caches monitor and serve, the other is cache deployment algorithm that is where to deploy caches. In this paper, we propose a deployment strategy of proxy caches, called LHCDS (Cache Deployment Strategy for Lower and Higher networks), including a new type of cache operation and its corresponding deployment algorithm. It can serve P2P traffic not only from the local lower access network to the higher transit ISP´s network but also within the higher transit ISP´s network itself. In LHCDS, caches are deployed at or near core routers of the transit ISP. We develop several deployment algorithms based on the new cache operation. We then evaluate the algorithms, and conclude that the proposed greedy algorithm is a viable and practical algorithm whose performance is close to optimal. Experiments also show that ISPs can achieve more P2P traffic decrease on links using LHCDS than previous strategies.
  • Keywords
    Internet; cache storage; peer-to-peer computing; telecommunication congestion control; telecommunication traffic; ISP networks; Internet services providers; LHCDS; P2P traffic; network congestion; novel deployment strategy; peer-to-peer systems; proxy caching; traffic surges; Greedy algorithms; Heuristic algorithms; Mathematical model; Monitoring; Network topology; Peer to peer computing; Software algorithms; cache deployment strategy; peer-to-peer network; proxy cache;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer and Information Technology (CIT), 2011 IEEE 11th International Conference on
  • Conference_Location
    Pafos
  • Print_ISBN
    978-1-4577-0383-6
  • Electronic_ISBN
    978-0-7695-4388-8
  • Type

    conf

  • DOI
    10.1109/CIT.2011.15
  • Filename
    6036757