2) United States Patent
oy
os)
om
o
os)
(2)
(58)
Gerber et al.
SYSTEM AND METHOD TO G
PARTICIPATION IN PEER-TO-PEER
SYSTEMS WITH PASSIVE MONITORING
ENVIRONMENT
Inventors; Alexandre Gerber, Madison, NJ (US)
Spatscheck, Randolph, NJ (US)
‘Sen, New Providence, NI
‘jay Todimala, Meaisoa, NJ (US)
Assignee: AT&T Intellectual Property I
Atlanta, GA (US)
Notice: Subject to any disclaimer, the tem ofthis
pateat is extended or adjusted under 3
USC. 154(b) by 235 days.
Appl. Now 12/025,703
Filed: Dees 1, 2008
Prior Publication Data
US 2010001385554 Jun, 3, 2010
Int. Cl
oar 1516 (2006.01)
Host. 1216 (2006.01)
Host. 12/66 (2013.01)
“7091232; 109/230
Field of Classification Search
cre Host 47/10
usp 700/232, 230
‘See pplication ile for complete search history.
US008959243B2
(10) Patent No.
4s) Date of Patent:
US 8,959,243 B2
Feb. 17, 2015
66) References Cited
US. PATENT DOCUMENTS
5012095 A 1/2000 Linketal
suena A 122000 Jiang
Tio6sS79 B2 62000 Trwverat et al
7oe0a18 82 62009 Burbeck ta
2ooauisea7t AL 9/2002 Dantaetal
2n090196186 AL 10005 Harille.WolEt at
annstoxsdea AL '4/2005 Clarketal
aououisiast AL 82006 Ananda
oUGIOLRERE AL $2000. Ganguly ea
aoononed702 AL ¥2007 atest al
aou7i3ea%0 AL 62007 riser eta
20UN00083%6 AL 12608 Coben cal
‘2090009272 AL+ 2008 Toleano assatat
SOURORISSAL ALS 92008 Melamed eta "09 208
So0gRSI950 AL* 11/2008 Wald eral 70208
annooteseas AL* 72009 Labovty ea
SO100D0SI7L AL* 1/2010. Arolvitch
* cited by examiner
Primary Examiner — Dustin Nguyen
Assistant Examiner — Joel Mesa
(74) Attorney, Agent, or Firm — Akerman LLP; Michael K.
Dixon Roy P Zachariah
6 ABSTRACT
A method includes identifying shared content by inspecting
peer-to-peer atic flaw and identifying source peers provi:
Jing the shared content, and requesting the shared eontet rom
the source peers, The method further includes receiving
requests forthe shared content from requesting peers, iden-
fifying requesting peers based on the requests Tor the shared
‘content, aid providing the shared content tou local subset of
the requesting peer.
16 Claims, 6 Drawing Sheets
a | s”
om
Vee
‘a
—
reve
roses
‘ra
0
=U.S. Patent Feb. 17, 2015 Sheet 1 of 6 US 8,959,243 B2
116)
f 08
SB
ae Lo
GQ. oe
\
/ "1
"> 14
FIG. 1U.S, Patent Feb. 17, 2015
200—~ |
Peer
me | Router
200—~ |
Peer
FIG. 2
Sheet 2 of 6 US 8,959,243 B2
S 200
208
Monitoring
Module
Participating
Server
210U.S, Patent Feb. 17,2015 Sheet 3 of
7 Anal Li
\nalyze
Traffic
304- +
Identify High-
306—
308
310
312
314
Impact Content
¥
Identify Peers
Providing High-
Impact Content
¥
Retrieve High-
Impact Content
from Peers
¥
Provide High-
Impact Content
on Local Peer
Server
¥
Identify Peers
Downloading
High-Impact
Content
y
Direct Peers to
Local Peer
Server
US 8,959,243 B2
FIG. 3U.S. Patent Feb. 17, 2015 Sheet 4 of 6 US 8,959,243 B2
407
Analyze P2P
Traffic
¥
aoe Identify Content
| Causing
Significant
Traffic between
Subnets
v
406—\, [Identify Peers
Providing
Content
y
408— Retrieve
Content from
Peers
¥
410 [Provide Content
on Local Peer
Server
¥
412—\_ [identify Peers
Receiving
Content
y
414, Direct Receiving
Peers to Local FIG. 4
Peer ServerU.S, Patent
Feb. 17,2015 Sheet 5 of 6
502—
Analyze
BitTorrent }€—
Traffic
¥
504-
506—
508—
510—
512—
514—
516—
Identify High-
Impact Content
¥
Retrieve Torrent|
File for High-
Impact Content
¥
Request List of
Peers Providing
High-Impact
Content from
Tracker
¥
Retrieve
Content from
Peers
¥
Provide Content]
on Local Peer
Server
y
Identify Peers
Receiving
Content
¥
Direct Receiving|
Peers to Local
Peer Server
US 8,959,243 B2
FIG. 5U.S. Patent Feb. 17, 2015 Sheet 6 of 6 US 8,959,243 B2
60
608
co 610
Processor
instructions] >]. }# ——F} Video display
}— 624
Ce 612
Main Memo
7 Alpha-
instructions | {* > | | Numeric Input
Device
624
606. 614
Static Memory
Cursor Control
instructions | [* ta | be > Device
624
620. 616
Drive Unit -}— 622
Network
Interface }¢——»| }& 4] [Computer
Device Readable
Medius77— 624
Instructions
618
Signal
Generation
Device
626.
FIG. 6US 8,959,243 B2
1
SYSTEM AND METHOD TO GUIDE ACTIVE
PARTICIPATION IN PEER-TO-PEER
[SYSTEMS WITH PASSIVE MONITORING.
ENVIRONMENT
PIELD OF THE DISCLOSURE
‘The present disclosure penerally relates fo communica
tions networks, and more particularly relates to systems and
methods fo guide ative participation in peer-to-peer systems
‘with passive monitoring.
BACKGROUND
Peer-to-peer (P2P) networks use diverse connectivity
between partieipants in network and the cumulative band-
width of network participants, rather than conventional cen-
tealized resources where a teatvely low number of servers
provides service or application. A pire P2P network does not
hve traditional elints or servers, but only equal peer nodes
that simultaneously fhnetion as both “clients” and “servers”
to the other nodes on the network,
P2P networks can be usefl for sharing content les con-
taining audio, video, or other data in digital format. tis
‘estimated that P2P filesharing, such as Bi Toxrent, represents
‘greater than 20% ofall broadband trafic on the Interact.
BRIEF DESCRIPTION OF THE DRAWINGS
1 will be appreciated that for simplicity and clarity of
iMlstation, elements illustrated inthe Figures have not nec-
cessarly been drawn to scale. For example, the dimensions of
some ofthe elements ae exaggerated relative to other ele-
ments, Embodiments incorporating teachings of the present
«disclosure are shown and deseribod with respect tothe d=
ings presented herein, in whieh
TIG. 1 isa block diagram illustrating @ communications
network in aecondance with one embadiment of the present
disclosure,
FIG. 2 is a block diguram illustrating a P2P system is
secondance with one embodiment of the present disclosure:
PIG, 3 is flow diagram illustrating an exemplary method
for participating in a P2P network in soeordance with one
‘embodiment ofthe present disclosure;
TG. 4 ie flow diagram illustrating an exemplary method
‘or participating in aP2P network in aecordance with another
‘embodiment ofthe present disclosure;
IG. 8 is flow diagram iistrating an exemplary method
{or participating in a P2P network in accordance with yet
another embodiment of the present disclosure; and
FIG. 6 san llastrative embodiment ofa general computer
system.
‘The use of the same reference symbols in different dew
{ngs indicates similar or identical items.
DETAILED DESCRIPTION OF THE DRAWINGS
The numerous innovative teachings ofthe present applica
tion will be described with particular reference to the pres-
‘ently preferred exemplary embodiments. However, it should
be understood tat this class of embodiments provides only a
few examples ofthe many advantageous uses ofthe innova
tive teachings herein. In genera, statements made in the
specification of the present application do not necessarily
Timit any’of the varios claimed inventions. Moreover, some
statements may apply to some inventive features but ot 0
others
0
o
2
FIG. 1 shows a communications network 100, such asthe
Interact. Communications aetwork 100 can include routers
102, 104, 106tbat communicate with ech other and form
anautonomous system (AS) 108. AS 108 can connect to other
ASs that form network 100 through a peering point at router
102. Additionally, 4 108 can include peer systems 110,112.
and 114 connectedto respective routers 102 nd 106 10 access
the network 100, Reuter 102 can provide ingress and egress
tor peer system 110. Router 106 can provide ingress and
‘gress for both of poor systems 112 and 114, Pocr systems
110, 112, and 114 ean form a P2P file-sharing network. Ina
2P ile-sharing nework, For example, peer system 12 ea
request a daa file from peer system 110. When peer system
110 has the data le, peer system ean provide the datafile
peer system 112
‘an embodiment, communications network 100 ca
‘include an originating server 116, monitoring node 118, and
participating server 120, Peer system 110 can receive con-
{ent fom originating server 116 or athersourees, and make
the content avaiable w peer ystems 112 and 114 through the
2P network. For example, peer system 112 ean request the
‘content ffom peer system 110, and poer system 110 can
provide the content peer system 112: Monitoring node 118
can inspec file-sharing tall from a subset of peer systems
such as peer systems 112 and 114, and may identify the
content requested by peer system 112. In an embodimen
{deep packet inspoction can be used to identity the eontent oF
‘the data ile being shared between peer systems, Additionally,
participating server 120canpartieipatein the P2P file-sharing
network. After the monitoring node 118 has identified the
content being shared through the P2P file-sharing network,
participating server 120 ean download the eontent from peer
‘Systems currently providing the conten such as pocr system
110, from the originating server 116, 0 from other soureesof
thecontent, The participating server 120 caa make the content
available to other peer systems such as peer systems 112 and
m4,
‘In an embodiment, providing the content from a server
closer to the requesting peer systems can reduce network
costs. Additionally, participating server 120 can gather infor
‘mation about the peer systems sharing the content, such asthe
{entity ofthe peer systems, the distribution of peers provid-
ing the content, the distribution of peers requesting the cone
‘ent, andthe ike. For example, the information ean be used 10
‘optimize the P2P file sharing, improve network performance,
ddoerease network costs, oF tack the propagation of files
through the P2P network
FIG, 2 illustrates a P2P system 200 for monitoring and
actively panicipating in P2P distbution of dat fles. Peer
202 ean communicate with peer 204 through a router 206.
ors 202 and 204 can be client system, such as client systex:
112. Router 206 can be similar to router 106. In an emiboai-
sen, communication between poer 202 and peer 204 may
travel through multiple routers, Funher, P2P system 200 can
include a monitoring module 208 and participating server
210, Monitoring module 208 and participating server 210 can
be implemented in hardware, software, or any combination
thereo- Additionally, monitoring module 208 and pariiat-
ing server 210 can be implemented on the same physical or
virtual machine, separate viral or physical machines atthe
‘sme locaton, of separate physical machines at different
Jocatons in the network. Further, the monitoring module 208
for the participating server 210 may be implemented a8 9
‘comportent of router 206,
‘Monitoring module 208 can passively monitor traffic
through router 206, Monitoring modi 208 can use packet
section techniques to identify the port numbers and Inter-US 8,959,243 B2
3
net Protocol (IP) address for peers 202 and 204, Monitoring
module 208 may identify P2P traffic based on destination or
source port number, protocol analysis, other means known ia
the art, or any combination thereof. Additionally, analysis of
the conten ofthe packet or packets can be used to idem the
‘content othe data file being distributed. Monitoring module
208 can use the infomation gathered by inspecting the P2P
teallic to identity ofthe content being shared. High impact
‘content can be content that utilizes significant amount of
network capacity, such as large files that are repeatedly trans-
Jered, files that are repeatedly transferred between subnets
‘and popular content tats frequently transmitted. Inanalter-
nate embodiment, specific content may be identified. For
‘example, a content owner may provide a list of content
licensed for active participation oF a list of content not
Ficensed for distribution
Participating server 210 can actively participate in P2P
lisiibuton of the high-impact content, Participating server
210 can ideatly peers thst have the content available, For
‘example, the partieipating server 210 may request the content
from peer 204. In nother example, the BitTorret protocol
say be used for transfering the dat file and the participating
server 210 may connect toa tracker receive a lis of peers
‘curently transferting pieces ofthe data ile. Additionally, the
participating server 210 can make the content avaiable for
‘download, such as by serving requests forthe content peer
202, or by notifying the tracker thatthe participating server
210; pieces ofthe dat ile to transfer. Further, the partici
pating server 210 may maintain a list ofthe IP addresses of
peers providing the high-impact content and pecrsroquesting
the high-impact content. Inan embodiment, the participating
server 210 may refise to setve a request from a peer for
‘exchided contet. In another embodiment, content distiba-
tion information, such asthe numberof peers requesting the
‘content, the distribution ofthe peers having the conten, the
‘identity of the posts participating in the distribution of the
‘content, and the like, may he wsed to distribute the shared
‘content across multiple participating servers 210 thoughout
the nonwork, such as to minimize network costs, The content
distribution information may also be provided to the content
‘owner, such as for accounting and billing purposes.
IG. 3 shows a low diagram illustrating a method for P2P.
disiibuton of high-impact content. At 302, P2P walle may
be analyzed, such s by monitoring module 208, The analysis
‘ofthe P2P tafe can include determining the pees involved,
jn the distribution ofthe content, the identity oF the contest,
the size ofthe content, the impaet ofthe distribution of the
‘content on the network, and the ike. At 304, high-impact,
‘content can be identified. High-impact content can include
‘content having significant effect on network resources, such
ss through heavy sharing, significant sharing across sub-nel-
Works, sharing larg files, ad the like, In aa embodimeat,
high-impact content ean include content licensed for active
participation, exeluded content, of any combination thereof.
‘AL 306, peers providing the high-impact content can be
identified. For example, peers providing the high-impact con-
tent can be identified, such as based on an IP addres. The
peers may be identified as.a potential source for retrieving the
high impact content. At 308, the high-impact content can be
relseved from the identied peers. Alternatively, requests for
the high-impact content can be sent. numberof peers. The
peers may be selected based on the network costs associated
‘with recelvng the content fom the poors. Additionally, poors
responding tothe request with the high-impact content canbe
‘denied as peers providing the high-impact content. At 302,
‘additional P2P tlic can be aualyzed.
0
o
4
At310, the high-impaet content can be provided on a local
peer server, such as participating server 210. The local peer
Server may provide the content to peers within the same
subnet moreeficontly than pee in another subnet. As such,
providing the high-impact eontenton the local peer serverean
redice network usage and decrease the time required forthe
peer to download the content. AU312, pects downloading the
high-impact content can be identified. For example, pecrs
downloading the high-impact content ean be identified based
‘on the IP address. At314, pees dewwaloading the high-impact
‘content fom 2 non-Tocal source ean be directed to the Focal
peer serverto reduce the time for retrieving the contet and to
rede the impact on the network, For example, the eonnec-
tion tothe local peer server may be more reliable than the
connection to a non-leal poet, and downloading peers may
preferably request content from the local peer server. la an
‘embodiment, peers ean be identified based on the requests for
‘content from the local peer server. In another embodiment,
peers requesting content froma non-local peer, or peers eure
rely downloading content from a non-local peer, may be
redirected, such as by a router, to the local poe. In yet another
embodiment, connections to non-local poers for reriving
high-impact content available onthe local pee server may be
Timited to reduce network impact and encourage retrieving.
the content from the local poor server
FIG. 4 shows a flow diagram illustrating an alternative
‘method for P2P distribution of content. At 402, P2P traffic
‘may be analyzed, such as by monitoring module 208, The
analysis ofthe P2P trafic ean include determining the peers
involved in the distribution ofthe content, the identity ofthe
content, the sizeof the content, the impact af the distribution
of the content on the network, andthe like. At 404, content
‘casing significant trafic between subnets can be identified
For example, when peers providing the content ae generally
located in aseparate subnet from peers requesting ae content
the traffic between the subnets can be significant, In an
embodiment, the content can include content licensed for
active participation, excluded content, or any combination
ther.
‘AL-406, peers providing the content can be identified as 2
potential Source for erieving the content For example, the
IP address of peers providing the content can be identified.
Additionally, the location within the network cam be deter-
‘mined based on the IP adress ofthe peer and the topology of
the network. At 408, the content can be retrieved from the
identified peers, Altematively, requests forthe content can be
sentto aniimber of peers, eer responding othe request With
‘the conteat canbe identified as peers providing the content. In
‘anembodiment,a local peer server located close o requesting
peers can retrieve the content from the serving peer. Alterna
tively, retrieving the content from another peer server may be
‘more elicent than retrieving from the serving pee.
"ALAIO, the content can be provided ona local peer server,
such as pariipating server 210. The local peer server may
provide the content to peers within the same subnet more
efficiently than can a peer in another subnet. As such, provid-
‘ng the content onthe local peer server ean reduce network
usage and decrease the time required forthe peer to download
the content. At 412, peers downloading the content can be
{dentifed. For example the IP adresses For peers download-
ing the content can be deteraied. A'414, poers downloading
the content from # non-local source ean be directed to the
local pooe server reduce the time for retrieving the content
and to reduce the impact on the network. For example, the
‘connection to the local pee Sever may be more reliable than
the comection to a nonelocal peer, and downloading pecrs
y preferably request content fom the local peer serve. InUS 8,959,243 B2
5
an embodiment, peers canbe ientifed based on the requests
or conteat from the loeal peer server
FIG. § shows a flow diageam illustrating another embodi-
sent ofthe method for P2P distribution of high-impact com-
teal. At $02, BivTorent raffle may be anilyzed, such as by
‘monitoring module 208, The analysis ofthe i Torrent traffic
‘can include determining the peers involved inthe distribution
‘of the content, the identity of the conten, the size of the
‘content, the impaet of the distribution of the content oa the
network, and the lke. At $04, high-impact content can be
‘entified. Ac 506, 2 torrent file forthe high-impaet content
‘ean he retrieved, The torrent file can inelude the identity of a
tracker or trackers maintaining ist of pees curently trans-
erring piooes ofthe dat le. At S08, de list of peers can be
retrieved from the tracker. At S10, the high-impact content
‘can be retrieved from the peers identified in the list. In an
‘embodiment, pieces of the data file may be preferentially
retrieved from peers closer inthe network or poces having 2
lower network cost. At $02, additional P2P teale ean be 2
anilyzed
‘ALS10, the high-impact content canbe provided on a local
peer server, such as participating server 210. The local pece
erver may provide the content to peers within the same
subnet more eficenty than peer in another subnet. As such,
providing the high-impact onteat on te local peer server ca
rexluce nework usage and decrease the time roquired forthe
peer to download the content, The local peer server may
hoviy the tracker that the local peer server has the high-
Jmpaet content available for downloading. At $12, poors
downloading the high-impact content can be identified. Por
‘example, the IP addresses of peers downloading the high-
‘impact content can be determined. Additionally. the ication
‘of the peers can be determined based on the IP address. At
S14, peers downloading the high-impact content from a non-
Jocal source can be directed othe local peer server to reduce
the time for retrieving the content and io feace the impact on
the network. Ina embodiment, content requests from non-
local peers to the lneal peer server may be refuse.
FIG. 6 shows anilusteative embodiment ofa general com=
putersystem 600, The computer system 601 can incide n sct
‘of instoctions that ean be executed to cause the computer
system to perform any one or more of the methods or com-
puterbased functions disclosed herein, The computer system
{600 may operateas a standalone deviee ormay be coanected.
such as by using a network, to other computer systems oF
peripheral devices.
In a networked deployment, the computer system may
‘operat inthe capacity ofa server or ascent user computer
Jn a servercliont user network environment, of a8 & pect
‘computer system in a P2P (or distributed) network environ
ment. The computer system 600 can also be implemented as
‘or incorporated into various devices, such as a personal com-
puter (PC),a tablet PC, an STB, a personal digital assistant
(PDA), a mobile device, a palmtop computer, laptop com-
puter, a desktop computer, a communications device, 2 wi
Jess telephone, a landline telephone, a control system,
‘camera, a seanner, a facsimile machine, a printer, pager, 3
personal trsted device, a web appliance, a network router,
‘witch or bridge, orany other machine capableof executing 3
set of instructions (sequential or otherwise) that specify
‘ction tobe taken by thst machine. In a particular embodi-
ment, the computer system 690 can be implemented using
‘electronic deviees that provide voiee, video or data commit
nication. Further, whilea single computer system 600isilus-
trated, the term “system” shall also be takea to incl any
collection of systems or sub-systems that individually oF
0
o
6
jointly execute a set, or multiple ses, of instructions to per
orm one or more computer functions.
‘The computer system 600 may include a processor 602,
suchas acentral processing unit(CPU),a graphiesprocessing
‘unit (GPU), oF bath, Moreover, the computer system 600 can
Jnclude a main memory 60M and a static memory 606 that can
‘communicate with each other via'a bus 608. As shown, the
‘computersystem 600 may further include a video display nit
{610 such 36a iguid crystal display (LCD), an organic light
cemiiting diode (OLED), a fat panel display, a solid-state
splay, or a eahode ray tube (CRT), Adltionaly, the com-
puter system 600 may include an input device 612 such as 2
keyboard, and a eusor control device 614 such as a mouse
Alternatively, input device 612 and cursor control device 614
‘an be combined ina touchpad or iouch sensitive sereen The
‘computer system 600 canals include disk deve unit 616, 2
signal generation device 618 such as a speaker or remote
control and a network interface device 620 to communicate
‘with anetwork 626. na paticularembodiment, the disk rive
‘unit 616 may include # computer-readable medium 622 ia
‘which one or more sets of instructions 624, suchas software,
can be embedded, Further, the instictions 624 may embody
fone of more of the methods oF logic as described herein In a
particular embodiment, the insinitions 624 may eside com-
pletely, or at least partially, within the main memory 604, the
atic memory 606, andlor within the procestor 602 dring
execution by the computer system 600, The main memory
{608 an! the processor 602 also may’ include computer-read-
able mest
“The illustrations ofthe embodiments described heroin are
intended to provide a general understanding of the stuctare
fof the various embodiments. The illustrations are not
intended to serve a¢ & complete description af all of the
elements and features of apparatus and systems that utilize
the structures or methods described herein. Many other
embodiments may'be apparent to those of skill ia the set upon
reviewing the dislosure, Other embodiments may be wilized
‘and derived from the disclosnre, such that stmetral and
logical substitutions and changes may be made without
‘departing from the seope of the diselosure, Additionally, the
ilkistations are merely representational and may aot be
‘dawn to seal. Certain proportions within the illustrations
‘may be exaggerated, while other proportions may be mini-
mized, Accordingly, the disclosure and the FIGs, are to be
regarded a illustrative rather than rstitive,
“The Abstract ofthe Disclosure is provided to comply with
37 CER. $1,720) and is submitted With the understanding
tat it will not be used to intemret or limit the scope or
‘meaning ofthe claims. In addition, inthe foregoing Detailed
Description of the Drawings, various features may be
aroupod together or described in a single embodiment forthe
purpose of streanlining the dsslosure. Thi dielosure isnot
to be interpreted as reflecting a intention thatthe claimed
cembodinients require more features than are expressly recited
in each claim, Rather, a the following claims reflect, inven-
tive subject matter may be directed to Jess than all of the
‘eatures of any ofthe disclosed embodiments. Thus, the fol
Jowing claims are incorporated into the Detailed Deseription
of the Drawings, with each claim standing on its own as
defining separately claimed subject matte,
‘The above disclosed subjest mater is to be considered
illustrative, and not restrictive, and the appondod claims are
intended 1 eover all sich modifications, enhancements, and
‘ther embodiments wich fall within the trae sprit and seope
ofthe present disclosed subject mater. Thus tothe maximum
extent allowed by law, the scope of the present disclosed
subject matter isto be determined by the broadest permissibleUS 8,959,243 B2
1
nerpretation of the following claims and their equivalents,
‘an shall not be resticteor listed by the foregoing detailed
“description,
‘What is claimed is
1. computer implemented method comprising:
‘dentfying, hy ullizing instructions from memory tht are
executed by a processor, a plurality of shared content
items by inspecting peer-to-peer tai ow using deep
packet inspection;
seleting, by utilizing the processor, one of the shared
‘content items basedon inspecting the peer-to-peer tralic
flow, wherein the one shared content item is selected
when the one shared content item is popular shared
‘content, s content having a significant efleeton network
resources, and is content witha lange file size that is
repeatedly ansferred, and wherein the one shared con
tent item s selected by being ina st of content fiensed
for ative participation
‘identifying, by utilizing the processor, a source peer pro>
viding the one shared content item:
downloading the one shared content item ata peer server
from the source peer
adding by uilizing the processor, he peer servertoalistol
peers curently transferring portions of the ane shared
Content item, wherein the one shared content item
includes an identity of a tracker including the list of
peers currently transfering portions of the one shared
content item:
‘wansmitting, by utilizing the processor, a notification tothe
tracker that the peer server bas the one shared caateat
item avaiable for downloading:
redirecting by utilizing the processor, a request for theone
shared content item to the peer server, whercin the
request is made by a requesting peer of a plurality of
requesting peer and the request is redirected tothe peer
server based on the peer server being in the ist of pers
currently transfering the ponions of the one shared
‘identifying, by wilizing the processor, the requesting pect
‘based on the request forthe oneshared content item: and
sroviding the one shared content item from the peer server
Toa subse of the plurality of requesting peers in same
subnet asthe peer server.
2. The method of claim 1, wherein the subset of the plural-
ty of requesting peers is Jetermined based on a network
topology.
'3.A.computer implemented method comprising
identifying. by ullzing instructions from memory that are
utilized by @ processor, a plurality of shared eootent
items by inspecting pee~4o-peer trafic ow:
selecting, by alilizing the processor, one of the shared
ccntent items based on inspecting the peer-to-peer rafle
flow; wherein the one shared content item is selected
‘when the one shared content item is popular shared
content, content havingasignifieanteflecton network
resources, and is content With lang file size tht is
‘repeatedly transferred, and wherein the one shared con-
{ent itemis selected by being ina list of content licensed
for ative participation
‘dentfying, by utilizing the processor, a souree peer pro>
viding the one shared content item, wherein the one
Shared content item ineludes an identity of a tracker
‘ncldinga list of peers curently transferring portions of
‘the one shared content item
0
o
8
downloading the one shared coateat item sta poer server
{fem the source peer based on network costs associated
‘with reeeiving the one shared content item from the
source poor, -
‘transmitting, by utilizing the processor, anotfication tothe
tracker thatthe peer server has the one shared content
item available for downloading;
receiving a request forthe one shared content item atthe
peer server froma roquesting peer, whereinthe requests
received by the peer server based on the peer server
being ina list of peers curently transtering portions of
the one shared eontent item; and
‘identifying, by wilizing the processor, the requesting peer
‘based on the request fr the one shared content item.
4.Themethod of claim 3 futher comprising providing the
‘one shared content item fo the requesting pee,
'. The method of elaim 3, wherein the one shared content
item is excluded content,
6A method comprising
inspecting by ulizing instructions from memory dat are
‘Sxected by a processor, peer-to-peer traffic of partic
‘ating peers using deep packet inspection to identify a
pluzality of shared content items;
selecting, by utilizing the processor. one of the shared
‘content items based om inspecting the peer-to-peer tra
fie, wherein he one shared coatent item isselected when
the one shared content item is popular shared contents
‘content having a significant effet on network resources,
land is content with a large filesize that is repeatedly
‘wansferred, and wherein the one shared content item is
selected by being ina ist of eontent licensed for active
participation:
identifying, by utilizing the processor, source peers having
the one shared content item, the source peers being
clifferent than the participating peers;
downloading, ata server, the one shared content item from
the soures poor;
providing the one shared content item:
‘adding, by utilizing the processor, the server to a lst of
‘peers currently transfering portions of the one shared
content item, wherein the one shared content item
inchides an identity of a tracker incloding the list of
peers currently transfering portions of the one shared
‘sonteat item;
ansenitting, by uilzing the processor, snotfication tothe
‘tracker thata peer server has the one shared content tem
available for downloading;
‘identifying, by ulizing the processor, a requesting peer
‘other than the participating peers requesting the one
shared content item and the server boing on the list of
peers: and
rodircting by wilizing the processor, the requesting peer
o theserver for theone shared content item based onthe
server being in thelist of peers curently transfering the
portions of one shared conten item.
7. The method of elaim 6, wherein the one shared content
item is provide to the requesting peer.
'8. The method of elaim 6, wherein the one shared content
item matches a list of eontent provided by a content owner,
9. A computer implentented method comprising
inspecting by ulizng instructions from memory that are
‘excoted by a processor, peer-to-peer trafic of partic
pating peers to identify a plurality of shared content
selecting, by utilizing the processor, one of the shared
‘content items hase on inspecting the poerto-pece tra
fie, wherein the shared content item i selected when theUS 8,959,243 B2
9
shared content item is popular shared conten, content
having a significant effect on network resources, ad is
content with a large lle size that is repeatedly trans-
ferred, and wherein the shared content item is selected
by being in a list oF content license for active partic
pation:
‘denifying, by uilizing the processor, source peers pro-
viding the one shared conteat item, the source peers
being dierent than the paricipating peers, wherein the
‘one shaved coateat tem includes an identity ofa tracker
including alistof peers curently transfering portions of
the one shared content ites
‘eansmittng, by ullizing the processor, a notification tothe
‘tracker hata peer servers the one shared cote item
available for downloading
seestng by izing the proceso, eer oer han he
participating peers hased on network costs associ
eet nese conteatn fot er,
sending, by utilizing the processor, a request for the one
shared eontent item tothe peer other than the paticipat-
ing peers, wherein the request is sent to the poer other
than the participating poers based on the peer other than
‘the participating peers being in the lst of peers currently
transferring portions of the one shared content item;
receiving a response tothe request ad
‘obtaining, by ulizing the processor, source information|
about onc of the source poets providing the one shared
{eantent item based an the response
10. The method ofeloim9, wherein the source information
includes one of location ofthe source poor an identity ofthe
source poet, and any combination theeor.
1. Themethod of claims, furher comprising detemnining
‘content distribution information for the one shared content
item, wherein the content distribution information includes 2
istibuton of one of a plurality of source peers, interact
protocol addresses ofthe plurality of source peers, cation oF
the plurality ofsource peers, and any combination thereof.
12. The method of elaim9, wherein the one shared content
item matches a list of content provided by a content ownee,
13. computer implemented method comprising:
inspecting, by utilizing insteuctions from memory that are
‘exceed by a processor, poerto-poer traffic of partici=
pating peers
10
ying, by wilizing the processor, a plurality of shared
‘content items based on inspecting peer-to-peer trae
selecting, by utilizing the processor, one of the shared
‘content tems hase on inspecting the pocrto-pecetral=
fie, wherein he one shared content item isselectod when
‘the one shared content tem is popular shared content, is
content havinga significant effet on network resources,
is content with a lage file size that is repeatedly trans-
ferred, snd wherein the one shared content stem is
selected by being ina is of eontent licensed for active
participation:
snaking the one shared conten item available fr a local
server, wherein the one shared content item inclodes an
identity of a tracker including a list of peers currently
‘tansferring portions of the one shared content item:
‘transmitting, by uilzing the processor, notification tothe
‘wacker thata peer server as the one shared content ite
available for downloading;
receiving requests for the One shared content item from
requesting peers;
‘oblaining, by utilizing the processor, requestor information
ased on the requests:
dentilying, by utilizing the processor, the requesting peers
‘downloading the one shred content item based om the
‘requestor infomation: and
redirecting, by utilizing the processor, the requesting peers
to the local server based on the requesting peers down
loading the one shared content item and based on the
local server being inthe list of poers currently transfer
ring portions of the one shared content item,
14. The method of claim 13, wherein the requestor infor
‘mation includes one ofa location of the requesting peer, an
‘deity of the requesting pee, and any combination thereof.
18. The method of claim 13, further comprising determin-
‘ng content distribution information for the one shared con-
{eat item, wherein the content distribution information
includes distribution ofa plurality of roquostng pers, inter-
et protocol addresses ofa plurality requesting peers, location
‘of the plurality of requesting peers, or any combination
thereot
16. The method of claim 13, wherein the one shared con-
tent item matches a Hist of eontent provided by a content
idk