Share This Article:

Performance Evaluation of Proactive Peer-to-Peer File-Sharing Application for Releasing Network Congestion of Backbone Network in an Intranet

Abstract Full-Text HTML XML Download Download as PDF (Size:1674KB) PP. 613-620
DOI: 10.4236/jsea.2012.58070    3,684 Downloads   5,675 Views  
Author(s)    Leave a comment

ABSTRACT

Peer-to-peer (P2P) application could be viewed as fast pull-based file-sharing system. P2P methods can deliver large files by dividing them into small chunks. However, P2P implementations employ greedy delivering strategies that can easily congest backbone network, but all kinds of data must be delivered on the backbone network. Through P2P methods, most of the connections available to a file host are occupied through pull-based methods by file retrievers. This limits the ability of the host to deliver any other data. P2P applications flood the backbone network with packets, thus leading to congestion. As a result, such P2P applications are banned on enterprise networks, where connections are expensive resources. Nevertheless P2P computing still retains significant advantages in file transmission. A delivering file can get to its destination through P2P application, but in the same time, the communication/delivery of other networking applications will be blocked. The data delivered/communicated through applications other than P2P one might have very important means for the management/business. Therefore, to utilize efficient P2P application on enterprise network is ideal, but the flooding of the backbone network by P2P chunks must be controlled. Thus, a P2P file-sharing application that actively manages network traffic would be ideal for the enterprise networks. Here, a proactive P2P (EP2P) file-sharing application proposed by Liang et al. (2009) that the performance has been proved by mathematic analysis and computer simulation could be considered as the solution that proactively manages network traffic. The best way to evaluate the system performance is through the real implementation on the network. In this study, the unit transmission time and block rate are evaluated as parameters determining the performance and cost of different file-sharing applications through 500 times of experiments. The experimental results show that through controllable P2P application, the manager could manage the bandwidth consumption of backbone network. The EP2P could be considered by the companies concerning on the balance between delivery efficiency and networking-traffic load.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

C. Liang, "Performance Evaluation of Proactive Peer-to-Peer File-Sharing Application for Releasing Network Congestion of Backbone Network in an Intranet," Journal of Software Engineering and Applications, Vol. 5 No. 8, 2012, pp. 613-620. doi: 10.4236/jsea.2012.58070.

References

[1] N. Saxena, C. M. Pinotti and S. K. Das, “A Probabilistic Push-Pull Hybrid Scheduling Algorithm for Asymmetric Wireless Environment,” Proceedings of the IEEE GLOBALCOM, Dallas, 29 November-3 December 2004.
[2] L. Guo, S. Chen, Z. Xiao, E. Tan, X. Ding and X. Zhang, “A Performance Study of BitTorrent-Like Peer-to-Peer Systems,” IEEE Journal on Selected Areas in Communications, Vol. 25, No. 1, 2007, pp. 155-169. doi:10.1109/JSAC.2007.070116
[3] C. C. Liang, C. H. Wang, H. Luh, P. Y. Hsu and W.Y. Yue, “Proactive Peer-to-Peer Traffic Control When Delivering Large Amounts of Content within a Large-Scale Organization,” Lecture Notes in Computer Science, Vol. 5764, 2009, pp. 217-228. doi:10.1007/978-3-642-04190-7_20
[4] M. Bhide, P. Deolasee, A. Katkar, A. Panchbudhe, K. Ramamritham and P. Shenoy, “Adaptive Push-Pull: Disseminating Dynamic Web Data,” IEEE Transactions on Computer, Vol. 51, No. 6, 2002, pp. 652-668. doi:10.1109/TC.2002.1009150
[5] S. Herrería-Alonso, A. Suárez-González, M. Fernández-Veiga, R. F. R. Rubio and C. López-García, “Improving Aggregate Flow Control in Differentiated Services Networks,” Computer Networks, Vol. 44, No. 4, 2004, pp. 499-512. doi:10.1016/j.comnet.2003.12.007
[6] X. Liu, J. Lan, P. Shenoy and K. Ramaritham, “Consistency Maintenance in Dynamic Peer-to-Peer Overlay Networks,” Computer Networks, Vol. 50, No. 6, 2006, pp. 859-876. doi:10.1016/j.comnet.2005.07.010
[7] R. B. Dilmaghani and R. R. Rao, “Hybrid Wireless Mesh Network with Application to Emergency Scenarios,” Journal of Software, Vol. 3, No. 2, 2008, pp. 52-60.
[8] C. C. Liang, P. Y. Hsu, J. D. Leu and H. Luh, “An Effective Approach for Content Delivery in an Evolving Intranet Environment—A Case Study of the Largest Telecom Company in Taiwan,” Lecture Notes in Computer Science, Vol. 3806, 2005, pp. 740-749. doi:10.1007/11581062_81
[9] C. H. Wu, K. Chiang, R. J. Yu and S. D. Wang, “Locality and Resource Aware Peer-to-Peer Overlay Networks,” Journal of the Chinese Institute of Engineers, Vol. 3, No. 7, 2008, pp. 1207-1217. doi:10.1080/02533839.2008.9671475
[10] M. Zhang, Y. Xiong, Q. Zhang and S. Yang, “Optimizing the Throughput of Data-Driven Peer-to-Peer Streaming,” IEEE Transactions on Parallel and Distributed System, Vol. 20, No. 1, 2009, pp. 97-110. doi:10.1109/TPDS.2008.69
[11] G. Kaur and D. Kumar, “MPLS Technology on IP Backbone Network,” International Journal of Computer Applications, Vol. 5, No. 1, 2010, pp. 13-16.
[12] R. M. Karp, C. Schindelhauer, S. Shenker and B. V?cking, “Randomized Rumor Spreading,” Proceedings of the IEEE FOCS, Redondo Beach, 12-14 November 2000, pp. 565-574.
[13] F. Azzedin and S. Khwaja, “Towards Trustworthy Peer-to-Peer Environments: An Appraisal Analysis Approach,” Journal of Next Generation Information Technology, Vol. 1, No. 1, 2010, pp. 61-76. doi:10.4156/jnit.vol1.issue1.6
[14] W. Su, “Chunghwa Telecom Is Intended to Follow NCC Decision Temporarily to Promote 20 M Fiber Networking Service,” 2010. http://www.ithome.com.tw/itadm/article.php?c=57497
[15] H. C. Hsieh, C. J. Lee, P. C. Liu and W. K. Shih, “Evidence-Based Fault Detecting Scheme under P2P Streaming Network,” ICL Technical Journal, Vol. 121, 2007, pp. 110-115.
[16] D. Kopec and S. Tamang, “Failures in Complex Systems: Case Studies, Causes, and Possible Remedies,” Proceedings of the ACM SIGCSE Bulletin, Vol. 39, No. 2, 2007, pp. 180-184. doi:10.1145/1272848.1272905
[17] R. H. Wind, K. A. Griggs and E. Y. Li, “An Architecture for Distributed Scenario Building and Evaluation,” Communication of the ACM, Vol. 48, No. 11, 2005, pp. 80-86. doi:10.1145/1096000.1096009
[18] K. C. Tsai and C. Chen, “Effect of Heterogeneity on Static Load Balance Algorithm Performance in DHT Systems,” Journal of the Chinese Institute of Engineers, Vol. 31, No. 2, 2008, pp. 301-311. doi:10.1080/02533839.2008.9671383
[19] S. Rieche, K. Wehrle, O. Landsiedel, S. Gotz and L. Petrak, “Reliability of Data in Structured Peer-to-Peer Systems,” Proceedings of the HOT-P2P, Volendam, 8 October 2004.

  
comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.