{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:51:47Z","timestamp":1760241107591,"version":"build-2065373602"},"reference-count":31,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2019,11,20]],"date-time":"2019-11-20T00:00:00Z","timestamp":1574208000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802162"],"award-info":[{"award-number":["61802162"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Major Special Science and Technology Project of Henan Province","award":["171100110600"],"award-info":[{"award-number":["171100110600"]}]},{"name":"the Science and Technology Key Project of Henan province","award":["182102210105, 182102210434 and 192102210259"],"award-info":[{"award-number":["182102210105, 182102210434 and 192102210259"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>With the extensive use of peer-to-peer applications in recent years, the network traffic becomes more dynamic and less predictable, which leads to the decline of network resource utilization and the degradation of network performance. Aiming towards the above problems, we explore how to strengthen the cooperation between peer-to-peer applications and networks, making the application adjust its own traffic mode according to current network traffic status to enhance the stability of network traffic. We improve two key algorithms of peer selection and choking\/unchoking in the protocol and introduce traffic relaxation to characterize traffic state while taking the current most popular peer-to-peer application (bit torrent protocol) as an example. In our improved method, peers are selected probabilistically according their traffic relaxation, and the double-parameter selection problem that simultaneously considers the traffic relaxation and transfer rate of peers is also solved. Finally, we conduct simulation experiments in two real network typologies with real traffic matrix data and different sizes of bit torrent swarms; the experimental results show that our method can significantly improve the stability of the network traffic without sacrificing or even improving the performance of the bit torrent protocol when compared with original BT protocol.<\/jats:p>","DOI":"10.3390\/info10120361","type":"journal-article","created":{"date-parts":[[2019,11,20]],"date-time":"2019-11-20T11:06:03Z","timestamp":1574247963000},"page":"361","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Bit Torrent Traffic Optimization Method for Enhancing the Stability of Network Traffic"],"prefix":"10.3390","volume":"10","author":[{"given":"Deguang","family":"Li","sequence":"first","affiliation":[{"name":"School of Information Technology, Luoyang Normal University, Luoyang 471934, China"}]},{"given":"Yongxin","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information Technology, Luoyang Normal University, Luoyang 471934, China"}]},{"given":"Shijie","family":"Jia","sequence":"additional","affiliation":[{"name":"School of Information Technology, Luoyang Normal University, Luoyang 471934, China"}]},{"given":"Dong","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Information Technology, Luoyang Normal University, Luoyang 471934, China"}]},{"given":"Yanling","family":"Jin","sequence":"additional","affiliation":[{"name":"School of Information Technology, Luoyang Normal University, Luoyang 471934, China"}]},{"given":"Yuansheng","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Computer Science, Sichuan University, Chengdu 610065, China"}]}],"member":"1968","published-online":{"date-parts":[[2019,11,20]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1959015","DOI":"10.1142\/S0218001419590158","article-title":"Research on application of artificial intelligence in computer network technology","volume":"33","author":"Wang","year":"2019","journal-title":"Int. J. Pattern Recognit. Artif. Intell."},{"unstructured":"Alshawwa, I.A., Al-Shawwa, M.O., and Abu-Naser, S.S. (2019, November 19). An Intelligent Tutoring System for Learning Computer Network CCNA. Available online: http:\/\/dstore.alazhar.edu.ps\/xmlui\/handle\/123456789\/129.","key":"ref_2"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1016\/j.jpdc.2018.10.002","article-title":"Simplified Biased Contribution Index (SBCI): A mechanism to make P2P network fair and efficient for resource sharing","volume":"124","author":"Awasthi","year":"2019","journal-title":"J. Parallel Distrib. Comput."},{"doi-asserted-by":"crossref","unstructured":"Essaid, M., Park, S., and Ju, H. (2019, January 14\u201317). Visualising Bitcoin\u2019s Dynamic P2P Network Topoogy and Performance. Proceedings of the 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Seoul, Korea.","key":"ref_4","DOI":"10.1109\/BLOC.2019.8751305"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1007\/s11036-018-1044-9","article-title":"Secure P2P Intelligent Network Transaction using Litecoin","volume":"24","author":"Padmavathi","year":"2019","journal-title":"Mob. Netw. Appl."},{"doi-asserted-by":"crossref","unstructured":"Puthusseri, K.S., Shetty, A., Patil, M., and Devadkar, K.K. (2019, January 4\u20136). Storage and Availability Aware Fragment Placement for P2P Storage Systems. Proceedings of the 2019 International Conference on Communication and Signal Processing (ICCSP), Tamil Nadu, India.","key":"ref_6","DOI":"10.1109\/ICCSP.2019.8698015"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"39547","DOI":"10.1109\/ACCESS.2018.2855135","article-title":"Software defined networking meets information centric networking: A survey","volume":"6","author":"Zhang","year":"2018","journal-title":"IEEE Access"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1109\/MCOM.2013.6461195","article-title":"Improving network management with software defined networking","volume":"51","author":"Kim","year":"2013","journal-title":"IEEE Commun. Mag."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"25487","DOI":"10.1109\/ACCESS.2017.2762291","article-title":"Advancing software-defined networks: A survey","volume":"5","author":"Cox","year":"2017","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"44","DOI":"10.4018\/IJICTHD.2018100104","article-title":"The State of the Art of Software Defined Networking (SDN): Network Management Solution in Current Network Architecture Using the SDN","volume":"10","author":"Jimson","year":"2018","journal-title":"Int. J. Inf. Commun. Technol. Hum. Dev. (IJICTHD)"},{"doi-asserted-by":"crossref","unstructured":"Mostafaei, H., Lospoto, G., Brandimartey, A., Di Lallo, R., Rimondini, M., and Di Battista, G. (2017, January 3\u20137). SDNS: Exploiting sdn and the dns to exchange traffic in a federated network. Proceedings of the 2017 IEEE Conference on Network Softwarization (NetSoft), Bologna, Italy.","key":"ref_11","DOI":"10.1109\/NETSOFT.2017.8004203"},{"doi-asserted-by":"crossref","unstructured":"Mostafaei, H., Lospoto, G., di Lallo, R., Rimondini, M., and Di Battista, G. (2017, January 3\u20137). Sdnetkit: A testbed for experimenting sdn in multi-domain networks. Proceedings of the 2017 IEEE Conference on Network Softwarization (NetSoft), Bologna, Italy.","key":"ref_12","DOI":"10.1109\/NETSOFT.2017.8004232"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1145\/1012888.1005698","article-title":"How to identify and estimate the largest traffic matrix elements in a dynamic environment","volume":"32","author":"Soule","year":"2004","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"doi-asserted-by":"crossref","unstructured":"Cao, J., Cleveland, W.S., Lin, D., and Sun, D.X. (2003). Internet traffic tends toward Poisson and independent as the load increases. Nonlinear Estimation and Classification, Springer.","key":"ref_14","DOI":"10.1007\/978-0-387-21579-2_6"},{"key":"ref_15","first-page":"112","article-title":"Green virtual topology design algorithm based on constraint-based routing","volume":"35","author":"Wu","year":"2014","journal-title":"J. Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1002\/dac.2684","article-title":"Toward energy-proportional Internet core networks: An energy-minimized routing and virtual topology design for Internet protocol layer","volume":"28","author":"Wu","year":"2015","journal-title":"Int. J. Commun. Syst."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/1070873.1070876","article-title":"The problem of synthetically generating IP traffic matrices: Initial recommendations","volume":"35","author":"Nucci","year":"2005","journal-title":"Comput. Commun. Rev."},{"doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Rodriguez, P., and Papagiannaki, K. (2005, January 19\u201321). Should internet service providers fear peerassisted content distribution?. Proceedings of the Internet Measurement Conference, Berkeley, CA, USA.","key":"ref_18","DOI":"10.1145\/1330107.1330115"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"4033","DOI":"10.1016\/j.comnet.2011.07.013","article-title":"On tradeoffs between cross-ISP P2P traffic and P2P streaming performance","volume":"55","author":"Yang","year":"2011","journal-title":"Comput. Netw."},{"key":"ref_20","first-page":"163","article-title":"Location awareness in unstructured peer-to-peer systems","volume":"6","author":"Liu","year":"2005","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"doi-asserted-by":"crossref","unstructured":"Ren, S., Tan, E., Luo, T., Chen, S., Guo, L., and Zhang, X. (2010, January 15\u201319). TopBT: A topology-aware and infrastructure-independent BitTorrent client. Proceedings of the IEEE INFOCOM, San Diego, CA, USA.","key":"ref_21","DOI":"10.1109\/INFCOM.2010.5461969"},{"key":"ref_22","first-page":"11","article-title":"P2P traffic optimization based P2P cache (in Chinese)","volume":"1","author":"Zhou","year":"2009","journal-title":"Telecommun. Netw. Tech."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1447","DOI":"10.1109\/TNET.2008.918081","article-title":"Traffic modeling and proportional partial caching for peer-to-peer systems","volume":"16","author":"Hefeeda","year":"2008","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/1273445.1273449","article-title":"Can ISPs and P2P Systems Co-Operate for Improved[22]Performance?","volume":"37","author":"Aggarwal","year":"2007","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"doi-asserted-by":"crossref","unstructured":"Bruni, L., Giacomazzi, P., and Poli, A. (2013, January 1\u20135). Performance optimization of the BitTorrent protocol in the framework of P4P IETF ALTO. Proceedings of the IWCMC 2013, Sardinia, Italy.","key":"ref_25","DOI":"10.1109\/IWCMC.2013.6583597"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1109\/MCOM.2009.5181900","article-title":"A Survey of Research on the Application-layer Traffic Optimization Problem and the Need for Layer Cooperation","volume":"47","author":"Gurbani","year":"2009","journal-title":"IEEE Commun. Mag."},{"unstructured":"Madhyastha, H.V., Isdal, T., Piatek, M., Dixon, C., Anderson, T., Krishnamurthy, A., and Venkataramani, A. (2006, January 6\u20138). iPlane: An information plane for distributed services. Proceedings of the 7th Symposium on Operating Systems Design and Implementation, Seattle, WA, USA.","key":"ref_27"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1475","DOI":"10.1007\/s11432-011-4464-8","article-title":"P2P traffic optimization","volume":"55","author":"Zhang","year":"2012","journal-title":"Sci. China Inf. Sci."},{"unstructured":"Chokkalingam, A., and Riyaz, F. (2019, November 20). BitTorrent Protocol Specification v 1.0. Available online: cs.ecs.baylor.edu\/~donahoo\/classes\/5321\/projects\/bittorrent\/BitTorrent%20Protocol%20Specification.doc.","key":"ref_29"},{"unstructured":"Yang, W., and Abu-Ghazaleh, N. (2005, January 27\u201329). GPS: A general peer-to-peer simulator and its use for modeling BitTorrent. Proceedings of the 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, Atlanta, GA, USA.","key":"ref_30"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1002\/net.20371","article-title":"SNDlib 1.0\u2014Survivable network design library","volume":"55","author":"Orlowski","year":"2010","journal-title":"Networks"}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/10\/12\/361\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:36:03Z","timestamp":1760189763000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/10\/12\/361"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,20]]},"references-count":31,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2019,12]]}},"alternative-id":["info10120361"],"URL":"https:\/\/doi.org\/10.3390\/info10120361","relation":{},"ISSN":["2078-2489"],"issn-type":[{"type":"electronic","value":"2078-2489"}],"subject":[],"published":{"date-parts":[[2019,11,20]]}}}