1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
|
Internet Research Task Force (IRTF) E. Marocco
Request for Comments: 6821 A. Fusco
Category: Informational Telecom Italia
ISSN: 2070-1721 I. Rimac
V. Gurbani
Bell Labs, Alcatel-Lucent
December 2012
Improving Peer Selection in Peer-to-Peer Applications:
Myths vs. Reality
Abstract
Peer-to-peer (P2P) traffic optimization techniques that aim at
improving locality in the peer selection process have attracted great
interest in the research community and have been the subject of much
discussion. Some of this discussion has produced controversial
myths, some rooted in reality while others remain unfounded. This
document evaluates the most prominent myths attributed to P2P
optimization techniques by referencing the most relevant study or
studies that have addressed facts pertaining to the myth. Using
these studies, the authors hope to either confirm or refute each
specific myth.
This document is a product of the IRTF P2PRG (Peer-to-Peer Research
Group).
Status of This Memo
This document is not an Internet Standards Track specification; it is
published for informational purposes.
This document is a product of the Internet Research Task Force
(IRTF). The IRTF publishes the results of Internet-related research
and development activities. These results might not be suitable for
deployment. This RFC represents the consensus of the Peer-to-peer
Research Group Research Group of the Internet Research Task Force
(IRTF). Documents approved for publication by the IRSG are not a
candidate for any level of Internet Standard; see Section 2 of RFC
5741.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc6821.
Marocco, et al. Informational [Page 1]
^L
RFC 6821 Peer Selection in P2P Applications December 2012
Copyright Notice
Copyright (c) 2012 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document.
Marocco, et al. Informational [Page 2]
^L
RFC 6821 Peer Selection in P2P Applications December 2012
Table of Contents
1. Introduction ....................................................4
2. Definitions .....................................................5
3. Myths, Facts, and Discussion ....................................6
3.1. Reduced Cross-Domain Traffic ...............................6
3.1.1. Facts ...............................................6
3.1.2. Discussion ..........................................7
3.1.3. Conclusions .........................................7
3.2. Increased Application Performance ..........................7
3.2.1. Facts ...............................................7
3.2.2. Discussion ..........................................8
3.2.3. Conclusions .........................................9
3.3. Increased Uplink Bandwidth Usage ...........................9
3.3.1. Facts ...............................................9
3.3.2. Discussion ..........................................9
3.3.3. Conclusions .........................................9
3.4. Impacts on Peering Agreements ..............................9
3.4.1. Facts ..............................................10
3.4.2. Discussion .........................................10
3.4.3. Conclusions ........................................11
3.5. Impacts on Transit ........................................11
3.5.1. Facts ..............................................11
3.5.2. Discussion .........................................11
3.5.3. Conclusions ........................................11
3.6. Swarm Weakening ...........................................12
3.6.1. Facts ..............................................12
3.6.2. Discussion .........................................12
3.6.3. Conclusions ........................................12
3.7. Improved P2P Caching ......................................12
3.7.1. Facts ..............................................12
3.7.2. Discussion .........................................13
3.7.3. Conclusions ........................................13
4. Security Considerations ........................................13
5. Acknowledgments ................................................13
6. Informative References .........................................13
Appendix A. Myths/References/Facts Matrix .........................15
Marocco, et al. Informational [Page 3]
^L
RFC 6821 Peer Selection in P2P Applications December 2012
1. Introduction
Peer-to-peer (P2P) applications used for file-sharing, streaming, and
real-time communications exchange large amounts of data in
connections established among the peers themselves and are
responsible for an important part of the Internet traffic. Since
applications have generally no knowledge of the underlying network
topology, the traffic they generate is frequent cause of congestions
in inter-domain links and significantly contributes to the raising of
transit costs paid by network operators and Internet Service
Providers (ISPs).
One approach to reduce congestions and transit costs caused by P2P
applications consists of enhancing the peer selection process with
the introduction of proximity information. This allows the peers to
identify the topologically closer resource among all the instances of
the resources they are searching through. Several solutions
following such an approach have recently been proposed [Choffnes]
[Aggarwal] [Xie], some of which are now being considered for
standardization in the IETF [ALTO]. While this document serves to
inform the protocol work going on in the IETF ALTO working group,
this document does not specify a protocol of any kind, nor is this
document a product of the IETF.
Despite extensive research based on simulations and field trials, it
is hard to predict how proposed solutions would perform in a real-
world systems made of millions of peers. For this reason, possible
effects and side effects of optimization techniques based on P2P
traffic localization have been a matter of frequent debate. This
document describes some of the most interesting effects, referencing
relevant studies that have addressed them and trying to determine
whether and in what measure they are likely to happen.
Each possible effect -- or myth -- is examined in three phases:
o Facts: in which a list of relevant data is presented, usually
collected from simulations or field trials;
o Discussion: in which the reasons supporting and opposing the myth
are discussed based on the facts previously listed;
o Conclusions: in which the authors try to express a reasonable
measure of the plausibility of the myth.
Note: Even though a myth is an unfounded or false notion, we have
nonetheless chosen to provocatively assign a confirmation
likelihood to each of the myths in Section 3. This is a
Marocco, et al. Informational [Page 4]
^L
RFC 6821 Peer Selection in P2P Applications December 2012
whimsical, but we believe effective, attempt that was inspired by
the TV show "Mythbusters", wherein each myth was "busted", deemed
"plausible", or "confirmed" by the end of the show.
This document represents the consensus of the P2PRG. The first
version of this document appeared in February 2009, and there was a
sizeable discussion on the contents of the document thereafter. The
document has been improved by incorporating comments from experts in
the area of peer-to-peer networks as well as casual, but informed,
users of such networks. The IRTF community has helped improve the
number of facts and quality of discussion and enhanced the
trustworthiness of the conclusions documented.
This document essentially represents the view of the participating
P2PRG IRTF community between 2009 and the latter part of 2010; as
such, it is like a snapshot: frozen in time. While some aspects are
confirmed with references to pertinent literature, other aspects
reflect the state of discussions in the RG at the time of writing and
may require further investigation beyond the publication date of this
document.
2. Definitions
Terminology defined in [RFC5693] is reused here; other definitions
should be consistent with the terminology in that document.
Seeder:
A peer that has a complete copy of the content it is sharing, and
still offers it for upload. The term "seeder" is adopted from
BitTorrent terminology and is used in this document to indicate
upload-only peers that are also in other kinds of P2P
applications.
Leecher:
A peer that has not yet completed the download of a specific
content (but usually has already started offering for upload the
part it is in possession of). The term "leecher" is adopted from
BitTorrent terminology and is used in this document to indicate
peers that are both uploading and downloading and are used in
other kinds of P2P applications.
Swarm:
The group of peers that are uploading and/or downloading pieces of
the same content. The term "swarm" is commonly used in
BitTorrent, to indicate all seeders and leechers exchanging chunks
Marocco, et al. Informational [Page 5]
^L
RFC 6821 Peer Selection in P2P Applications December 2012
of a particular file; however, in this document, it is used more
generally (e.g., in the case of P2P streaming applications) to
refer to all peers receiving and/or transmitting the same media
stream.
Tit-for-Tat:
A content exchange strategy where the amount of data sent by a
leecher to another leecher is roughly equal to the amount of data
received from it. P2P applications, most notably BitTorrent,
adopt such an approach to maximize resources shared by the users.
Surplus Mode:
The status of a swarm where the upload capacity exceeds the
download demand. A swarm in surplus mode is often referred to as
"well seeded".
Transit:
The service through which a network can exchange IP packets with
all other networks to which it is not directly connected. The
transit service is always regulated by a contract, according to
which the customer (i.e., a network operator or an ISP) pays the
transit provider per amount of data exchanged.
Peering:
The direct interconnection between two separate networks for the
purpose of exchanging traffic without requiring a transit
provider. Peering is usually regulated by agreements taking in
account the amount of traffic generated by each party in each
direction.
3. Myths, Facts, and Discussion
3.1. Reduced Cross-Domain Traffic
The reduction in cross-domain traffic (and thus in transit costs due
to it) is one of the positive effects P2P traffic localization
techniques are expected to cause, and also the main reason why ISPs
look at them with interest. Simulations and field tests have shown a
reduction varying from 20% to 80%.
3.1.1. Facts
1. Various simulations and initial field trials of the P4P solution
[Xie] on average show a 70% reduction of cross-domain traffic.
Marocco, et al. Informational [Page 6]
^L
RFC 6821 Peer Selection in P2P Applications December 2012
2. Data observed in Comcast's P4P trial [RFC5632] show a 34%
reduction of the outgoing P2P traffic and an 80% reduction of the
incoming.
3. Simulations of the "oracle-based" approach [Aggarwal] proposed by
researchers at Technischen Universitat Berlin (TU Berlin) show an
increase in local exchanges from 10% in the unbiased case to
60%-80% in the localized case.
4. Experiments with real BitTorrent clients and real distributions
of peers per Autonomous System (AS) run by researchers at INRIA
[LeBlond] have shown that ASes with 100 peers or more can save
99.5% of cross-domain traffic with high values of locality. They
have also shown that on a global scale, i.e., 214,443 torrents,
6,1113,224 unique peers, and 9,605 ASes, high locality can save
40% of global inter-AS traffic, i.e., 4.56 Petabytes (PB) on 11.6
PB. This result shows that locality would be beneficial at the
scale of the Internet.
3.1.2. Discussion
Tautologically, P2P traffic localization techniques tend to localize
content exchanges, and thus reduce cross-domain traffic.
3.1.3. Conclusions
Confirmed.
3.2. Increased Application Performance
Ostensibly, the increase in application performance is the main
reason for the consideration of P2P traffic localization techniques
in academia and industry. The expected increase depends on the
specific application: file-sharing applications witness an increase
in the download rate, real-time communication applications observe
lower delay and jitter, and streaming applications can benefit by a
high constant bitrate.
3.2.1. Facts
1. Various simulations and initial field trials of the P4P solution
[Xie] show an average reduction of download completion times
between 10% and 23%.
Marocco, et al. Informational [Page 7]
^L
RFC 6821 Peer Selection in P2P Applications December 2012
2. Data observed in Comcast's P4P trial [RFC5632] show an increase
in download rates between 13% and 85%. Interestingly, the data
collected in the experiment also indicate that fine-grained
localization is less effective in improving download performance
compared to lower levels of localization.
3. Data collected in the Ono experiment [Choffnes] show a 31%
average download rate improvement.
* In networks where the ISP provides higher bandwidth for
in-network traffic (e.g., as in the case of a Romanian ISP
(RDSNET), described in [Choffnes]), the increase is
significantly higher.
* In networks with relatively low uplink bandwidth (as the case
of Easynet, described in [Choffnes]), traffic localization
slightly degrades application performance.
4. Simulations of the "oracle-based" approach [Aggarwal] proposed by
researchers at TU Berlin show a reduction in download times
between 16% and 34%.
5. Simulations by Bell Labs [Seetharaman] indicate that localization
is not as effective in all scenarios and that the user experience
can suffer in certain locality-aware swarms based on the actual
implementation of locality.
6. Experiments with real clients run by researchers at INRIA
[LeBlond] have shown that the measured application performance is
a function of the degree of congestion on links on which the
locality policy tries to reduce the traffic. Furthermore, they
have also shown that, in the case of severe bottlenecks,
BitTorrent with locality can be more than 200% faster than
regular BitTorrent.
3.2.2. Discussion
It seems that traffic localization techniques often cause an
improvement in application performance. However, it must be noted
that such beneficial effects heavily depend on the network
infrastructures. In some cases, for example, in networks with
relatively low uplink bandwidth, localization seems to be useless if
not harmful. Also, beneficial effects depend on the swarm size;
imposing locality when only a small set of local peers is available
may even decrease download performance for local peers.
Marocco, et al. Informational [Page 8]
^L
RFC 6821 Peer Selection in P2P Applications December 2012
3.2.3. Conclusions
Very likely, especially for large swarms and in networks with high
capacity.
3.3. Increased Uplink Bandwidth Usage
The increase in uplink bandwidth usage would be a negative effect,
especially in environments where the access network is based on
technologies providing asymmetric upstream/downstream bandwidth
(e.g., DSL or Data Over cable Service Interface Specification
(DOCSIS)).
3.3.1. Facts
1. Data observed in Comcast's P4P trial [RFC5632] show no increase
in the uplink traffic.
3.3.2. Discussion
Mathematically, average uplink traffic remains the same as long as
the swarm is not in surplus mode. However, in some particular cases
where surplus capacity is available, localization may lead to local
low-bandwidth leechers connecting to each other instead of trying the
external seeders. Even if such a phenomenon has not been observed in
simulations and field trials, it could occur to applications that use
localization as the only means for optimization when some content
becomes popular in different areas at different times (as is the case
of prime-time TV shows distributed on BitTorrent networks minutes
after getting aired in North America).
3.3.3. Conclusions
Unlikely.
3.4. Impacts on Peering Agreements
Peering agreements are usually established on a reciprocity basis,
assuming that the amount of data sent and received by each party is
roughly the same (or, in case of asymmetric traffic volumes, a
compensation fee is paid by the party that would otherwise obtain the
most gain). P2P traffic localization techniques aim at reducing
cross-domain traffic and thus might also impact peering agreements.
Marocco, et al. Informational [Page 9]
^L
RFC 6821 Peer Selection in P2P Applications December 2012
3.4.1. Facts
No significant publications, simulations, or trials have tried to
understand how traffic localization techniques can influence factors
that rule how peering agreements are established and maintained.
3.4.2. Discussion
This is a key topic for network operators and ISPs, and it certainly
deserves to be analyzed more accurately. Some random thoughts
follow.
It seems reasonable to expect different effects depending on the
kinds of agreements. For example:
o ISPs with different customer bases: the ISP whose customers
generate more P2P traffic can achieve a greater reduction of
cross-domain traffic and thus could probably be in a position to
renegotiate the contract ruling the peering agreement;
o ISPs with similar customer bases:
* ISPs with different access technologies: customers of the ISP
that provides higher bandwidth -- and, in particular, higher
uplink bandwidth -- will have more incentives for keeping their
P2P traffic local. Consequently, the ISP with a better
infrastructure will be able to achieve a greater reduction in
cross-domain traffic and will be probably in a position to
re-negotiate the peering agreement;
* ISPs with similar access technologies: both ISPs would achieve
roughly the same reduction in cross-domain traffic; thus, the
conditions under which the peering agreement had been
established would not change much.
As a consequence of the reasoning above, it seems sensible to expect
that the simple fact that one ISP starts localizing its P2P traffic
will be a strong incentive for the ISPs it peers with to do that as
well.
It's worth noting that traffic manipulation techniques have been
reportedly used by ISPs to obtain peering agreements [Norton] with
larger ISPs. One of the most used techniques involves injecting
forged traffic into the target ISP's network, in order to increase
its transit costs. Such a technique aims at increasing the relevance
of the source ISP in the target's transit bill and thus motivate the
latter to sign a peering agreement. However, traffic injection is
exclusively unidirectional and easy to detect. On the other hand, if
Marocco, et al. Informational [Page 10]
^L
RFC 6821 Peer Selection in P2P Applications December 2012
a localization-like service were used to direct P2P requests toward
the target network, the resulting traffic would appear fully
legitimate and, since in popular applications that follow the
tit-for-tat approach peers tend to upload to the peers they download
from, in many cases also bidirectional.
3.4.3. Conclusions
Likely.
3.5. Impacts on Transit
One of the main goals of P2P traffic localization techniques is to
allow ISPs to keep local a part of the traffic generated by their
customers and thus save on transit costs. However, similar
techniques based on de-localization rather than localization may be
used by those ISPs that are also transit providers to artificially
increase the amount of data exchanged with networks to which they
provide transit (i.e., pushing the peers run by their customers to
establish connections with peers in the networks that pay them for
transit).
3.5.1. Facts
No significant publications, simulations or trials have tried to
study effects of traffic localization techniques on the dynamics of
transit provision economics.
3.5.2. Discussion
It is actually very hard to predict how the economics of transit
provision would be affected by the tricks some transit providers
could play on their customers making use of P2P traffic localization
-- or, in this particular case, de-localization -- techniques. This
is also a key topic for ISPs, definitely worth an accurate
investigation.
Probably, the only lesson transit and peering agreement have taught
us so far [CogentVsAOL] [SprintVsCogent] is that, at the end of the
day, no economic factor, no matter how relevant it is, is able to
isolate different networks from each other.
3.5.3. Conclusions
Likely.
Marocco, et al. Informational [Page 11]
^L
RFC 6821 Peer Selection in P2P Applications December 2012
3.6. Swarm Weakening
Peer selection techniques based on locality information are certainly
beneficial in areas where the density of peers is high enough, but
may cause damages otherwise. Some studies have tried to understand
to what extent locality can be pushed without damaging peers in
isolated parts of the network.
3.6.1. Facts
1. Experiments with real BitTorrent clients run by researchers at
INRIA [LeBlond] have shown that, in BitTorrent, even when peer
selection is heavily based on locality, swarms do not get
damaged.
2. Simulations by Bell Labs [Seetharaman] indicate that the user
experience can suffer in certain locality-aware swarms based on
the actual implementation of locality.
3.6.2. Discussion
It seems reasonable to expect that excessive traffic localization
will cause some degree of deterioration in P2P swarms based on the
tit-for-tat approach, and the damages of such deterioration will
likely affect most users in networks with lower density of peers.
However, while [LeBlond] shows that BitTorrent is extremely robust,
the level of tolerance to locality for different P2P algorithms
should be evaluated on a case-by-case basis.
3.6.3. Conclusions
Plausible, in some circumstances.
3.7. Improved P2P Caching
P2P caching has been proposed as a possible solution to reduce cross-
domain as well as uplink P2P traffic. Since the cache servers
ultimately act as seeders, a cache-aware localization service would
allow a seamless integration of a caching infrastructure with P2P
applications [EDGE-CACHES].
3.7.1. Facts
1. A traffic analysis performed in a major Israeli ISP [Leibowitz]
has shown that P2P traffic has a theoretical caching potential of
67% byte-hit-rate.
Marocco, et al. Informational [Page 12]
^L
RFC 6821 Peer Selection in P2P Applications December 2012
3.7.2. Discussion
P2P caching may be beneficial for both ISPs and network users, and
locality-based optimizations may help the ISP to direct the peers
towards caches. Anyway, it is hard to figure at this point in time
if the positive effects of localization will make caching superfluous
or not economically justifiable for the ISP.
3.7.3. Conclusions
Plausible, if cost-effective for the ISP.
4. Security Considerations
This document is a compendium of observed issues in peer-to-peer
networks with an informed look at whether the issue is known to
actually exist in the network or whether the issue is, well, a non-
issue. As such, this document does not introduce any new security
considerations in peer-to-peer networks.
5. Acknowledgments
This documents tries to summarize discussions that happened in live
meetings and on several mailing lists: all those who are reading this
have probably contributed more ideas and more material than the
authors themselves.
6. Informative References
[ALTO] "Application-Layer Traffic Optimization (ALTO)
Working Group",
<http://ietf.org/html.charters/alto-charter.html>.
[Aggarwal] Aggarwal, V., Feldmann, A., and C. Scheidler, "Can
ISPs and P2P systems co-operate for improved
performance?", in ACM SIGCOMM Computer
Communications Review, vol. 37, no. 3.
[Choffnes] Choffnes, D. and F. Bustamante, "Taming the
Torrent: A practical approach to reducing cross-ISP
traffic in P2P systems", in ACM SIGCOMM Computer
Communication Review, vol. 38, no. 4.
[CogentVsAOL] Noguchi, Y., "Peering Dispute With AOL Slows Cogent
Customer Access", appeared in the Washington Post,
December 17, 2002.
Marocco, et al. Informational [Page 13]
^L
RFC 6821 Peer Selection in P2P Applications December 2012
[EDGE-CACHES] Weaver, N., "Peer to Peer Localization Services and
Edge Caches", Work in Progress, March 2009.
[LeBlond] Le Blond, S., Legout, A., and W. Dabbous, "Pushing
BitTorrent Locality to the Limit",
<http://hal.inria.fr/>.
[Leibowitz] Leibowitz, N., Bergman, A., Ben-Shaul, R., and A.
Shavit, "Are file swapping networks cacheable?
Characterizing p2p traffic", in proceedings of the
7th Int. WWW Caching Workshop.
[Norton] Norton, W., "The art of Peering: The peering
playbook", <http://d.drpeering.net/>.
[RFC5632] Griffiths, C., Livingood, J., Popkin, L., Woundy,
R., and Y. Yang, "Comcast's ISP Experiences in a
Proactive Network Provider Participation for P2P
(P4P) Technical Trial", RFC 5632, September 2009.
[RFC5693] Seedorf, J. and E. Burger, "Application-Layer
Traffic Optimization (ALTO) Problem Statement",
RFC 5693, October 2009.
[Seetharaman] Seetharaman, S., Hilt, V., Rimac, I., and M. Ammar,
"Applicability and Limitations of Locality-
Awareness in BitTorrent File-Sharing".
[SprintVsCogent] Ricknas, M., "Sprint-Cogent Dispute Puts Small Rip
in Fabric of Internet", PCWorld Article,
October 2008,
<http://www.pcworld.com/businesscenter/article
/153123/sprintcogent_dispute_puts_small_rip_in_
fabric_of_internet.html>.
[Xie] Xie, H., Yang, Y., Krishnamurthy, A., Liu, Y., and
A. Silberschatz, "P4P: Explicit Communications for
Cooperative Control Between P2P and Network
Providers", in ACM SIGCOMM Computer Communication
Review, vol. 38, no. 4.
Marocco, et al. Informational [Page 14]
^L
RFC 6821 Peer Selection in P2P Applications December 2012
Appendix A. Myths/References/Facts Matrix
+----------------------+-------+-----------+------------+-----------+
| | [Xie] | [RFC5632] | [Aggarwal] | [LeBlond] |
+----------------------+-------+-----------+------------+-----------+
| Cross-Domain Traffic | X | X | X | X |
| (Section 3.1) | | | | |
| Application | X | X | X | X |
| Performance | | | | |
| (Section 3.2) | | | | |
| Uplink Bandwidth | | X | | |
| (Section 3.3) | | | | |
| Impacts on Peering | | | | |
| (Section 3.4) | | | | |
| Impacts on Transit | | | | |
| (Section 3.5) | | | | |
| Swarm Weakening | | | | X |
| (Section 3.6) | | | | |
| Improved P2P Caching | | | | |
| (Section 3.7) | | | | |
+----------------------+-------+-----------+------------+-----------+
+------------------------+------------+---------------+-------------+
| | [Choffnes] | [Seetharaman] | [Leibowitz] |
+------------------------+------------+---------------+-------------+
| Cross-Domain Traffic | | | |
| (Section 3.1) | | | |
| Application | X | X | X |
| Performance | | | |
| (Section 3.2) | | | |
| Uplink Bandwidth | | | |
| (Section 3.3) | | | |
| Impacts on Peering | | | |
| (Section 3.4) | | | |
| Impacts on Transit | | | |
| (Section 3.5) | | | |
| Swarm Weakening | | X | |
| (Section 3.6) | | | |
| Improved P2P Caching | | | X |
| (Section 3.7) | | | |
+------------------------+------------+---------------+-------------+
Marocco, et al. Informational [Page 15]
^L
RFC 6821 Peer Selection in P2P Applications December 2012
Authors' Addresses
Enrico Marocco
Telecom Italia
EMail: enrico.marocco@telecomitalia.it
Antonio Fusco
Telecom Italia
EMail: antonio2.fusco@telecomitalia.it
Ivica Rimac
Bell Labs, Alcatel-Lucent
EMail: rimac@bell-labs.com
Vijay K. Gurbani
Bell Labs, Alcatel-Lucent
EMail: vkg@bell-labs.com
Marocco, et al. Informational [Page 16]
^L
|