You are on page 1of 12
2) United States Patent oy os) om o os) (2) (58) Gerber et al. SYSTEM AND METHOD TO G PARTICIPATION IN PEER-TO-PEER SYSTEMS WITH PASSIVE MONITORING ENVIRONMENT Inventors; Alexandre Gerber, Madison, NJ (US) Spatscheck, Randolph, NJ (US) ‘Sen, New Providence, NI ‘jay Todimala, Meaisoa, NJ (US) Assignee: AT&T Intellectual Property I Atlanta, GA (US) Notice: Subject to any disclaimer, the tem ofthis pateat is extended or adjusted under 3 USC. 154(b) by 235 days. Appl. Now 12/025,703 Filed: Dees 1, 2008 Prior Publication Data US 2010001385554 Jun, 3, 2010 Int. Cl oar 1516 (2006.01) Host. 1216 (2006.01) Host. 12/66 (2013.01) “7091232; 109/230 Field of Classification Search cre Host 47/10 usp 700/232, 230 ‘See pplication ile for complete search history. US008959243B2 (10) Patent No. 4s) Date of Patent: US 8,959,243 B2 Feb. 17, 2015 66) References Cited US. PATENT DOCUMENTS 5012095 A 1/2000 Linketal suena A 122000 Jiang Tio6sS79 B2 62000 Trwverat et al 7oe0a18 82 62009 Burbeck ta 2ooauisea7t AL 9/2002 Dantaetal 2n090196186 AL 10005 Harille.WolEt at annstoxsdea AL '4/2005 Clarketal aououisiast AL 82006 Ananda oUGIOLRERE AL $2000. Ganguly ea aoononed702 AL ¥2007 atest al aou7i3ea%0 AL 62007 riser eta 20UN00083%6 AL 12608 Coben cal ‘2090009272 AL+ 2008 Toleano assatat SOURORISSAL ALS 92008 Melamed eta "09 208 So0gRSI950 AL* 11/2008 Wald eral 70208 annooteseas AL* 72009 Labovty ea SO100D0SI7L AL* 1/2010. Arolvitch * cited by examiner Primary Examiner — Dustin Nguyen Assistant Examiner — Joel Mesa (74) Attorney, Agent, or Firm — Akerman LLP; Michael K. Dixon Roy P Zachariah 6 ABSTRACT A method includes identifying shared content by inspecting peer-to-peer atic flaw and identifying source peers provi: Jing the shared content, and requesting the shared eontet rom the source peers, The method further includes receiving requests forthe shared content from requesting peers, iden- fifying requesting peers based on the requests Tor the shared ‘content, aid providing the shared content tou local subset of the requesting peer. 16 Claims, 6 Drawing Sheets a | s” om Vee ‘a — reve roses ‘ra 0 = U.S. Patent Feb. 17, 2015 Sheet 1 of 6 US 8,959,243 B2 116) f 08 SB ae Lo GQ. oe \ / "1 "> 14 FIG. 1 U.S, Patent Feb. 17, 2015 200—~ | Peer me | Router 200—~ | Peer FIG. 2 Sheet 2 of 6 US 8,959,243 B2 S 200 208 Monitoring Module Participating Server 210 U.S, Patent Feb. 17,2015 Sheet 3 of 7 Anal Li \nalyze Traffic 304- + Identify High- 306— 308 310 312 314 Impact Content ¥ Identify Peers Providing High- Impact Content ¥ Retrieve High- Impact Content from Peers ¥ Provide High- Impact Content on Local Peer Server ¥ Identify Peers Downloading High-Impact Content y Direct Peers to Local Peer Server US 8,959,243 B2 FIG. 3 U.S. Patent Feb. 17, 2015 Sheet 4 of 6 US 8,959,243 B2 407 Analyze P2P Traffic ¥ aoe Identify Content | Causing Significant Traffic between Subnets v 406—\, [Identify Peers Providing Content y 408— Retrieve Content from Peers ¥ 410 [Provide Content on Local Peer Server ¥ 412—\_ [identify Peers Receiving Content y 414, Direct Receiving Peers to Local FIG. 4 Peer Server U.S, Patent Feb. 17,2015 Sheet 5 of 6 502— Analyze BitTorrent }€— Traffic ¥ 504- 506— 508— 510— 512— 514— 516— Identify High- Impact Content ¥ Retrieve Torrent| File for High- Impact Content ¥ Request List of Peers Providing High-Impact Content from Tracker ¥ Retrieve Content from Peers ¥ Provide Content] on Local Peer Server y Identify Peers Receiving Content ¥ Direct Receiving| Peers to Local Peer Server US 8,959,243 B2 FIG. 5 U.S. Patent Feb. 17, 2015 Sheet 6 of 6 US 8,959,243 B2 60 608 co 610 Processor instructions] >]. }# ——F} Video display }— 624 Ce 612 Main Memo 7 Alpha- instructions | {* > | | Numeric Input Device 624 606. 614 Static Memory Cursor Control instructions | [* ta | be > Device 624 620. 616 Drive Unit -}— 622 Network Interface }¢——»| }& 4] [Computer Device Readable Medius77— 624 Instructions 618 Signal Generation Device 626. FIG. 6 US 8,959,243 B2 1 SYSTEM AND METHOD TO GUIDE ACTIVE PARTICIPATION IN PEER-TO-PEER [SYSTEMS WITH PASSIVE MONITORING. ENVIRONMENT PIELD OF THE DISCLOSURE ‘The present disclosure penerally relates fo communica tions networks, and more particularly relates to systems and methods fo guide ative participation in peer-to-peer systems ‘with passive monitoring. BACKGROUND Peer-to-peer (P2P) networks use diverse connectivity between partieipants in network and the cumulative band- width of network participants, rather than conventional cen- tealized resources where a teatvely low number of servers provides service or application. A pire P2P network does not hve traditional elints or servers, but only equal peer nodes that simultaneously fhnetion as both “clients” and “servers” to the other nodes on the network, P2P networks can be usefl for sharing content les con- taining audio, video, or other data in digital format. tis ‘estimated that P2P filesharing, such as Bi Toxrent, represents ‘greater than 20% ofall broadband trafic on the Interact. BRIEF DESCRIPTION OF THE DRAWINGS 1 will be appreciated that for simplicity and clarity of iMlstation, elements illustrated inthe Figures have not nec- cessarly been drawn to scale. For example, the dimensions of some ofthe elements ae exaggerated relative to other ele- ments, Embodiments incorporating teachings of the present «disclosure are shown and deseribod with respect tothe d= ings presented herein, in whieh TIG. 1 isa block diagram illustrating @ communications network in aecondance with one embadiment of the present disclosure, FIG. 2 is a block diguram illustrating a P2P system is secondance with one embodiment of the present disclosure: PIG, 3 is flow diagram illustrating an exemplary method for participating in a P2P network in soeordance with one ‘embodiment ofthe present disclosure; TG. 4 ie flow diagram illustrating an exemplary method ‘or participating in aP2P network in aecordance with another ‘embodiment ofthe present disclosure; IG. 8 is flow diagram iistrating an exemplary method {or participating in a P2P network in accordance with yet another embodiment of the present disclosure; and FIG. 6 san llastrative embodiment ofa general computer system. ‘The use of the same reference symbols in different dew {ngs indicates similar or identical items. DETAILED DESCRIPTION OF THE DRAWINGS The numerous innovative teachings ofthe present applica tion will be described with particular reference to the pres- ‘ently preferred exemplary embodiments. However, it should be understood tat this class of embodiments provides only a few examples ofthe many advantageous uses ofthe innova tive teachings herein. In genera, statements made in the specification of the present application do not necessarily Timit any’of the varios claimed inventions. Moreover, some statements may apply to some inventive features but ot 0 others 0 o 2 FIG. 1 shows a communications network 100, such asthe Interact. Communications aetwork 100 can include routers 102, 104, 106tbat communicate with ech other and form anautonomous system (AS) 108. AS 108 can connect to other ASs that form network 100 through a peering point at router 102. Additionally, 4 108 can include peer systems 110,112. and 114 connectedto respective routers 102 nd 106 10 access the network 100, Reuter 102 can provide ingress and egress tor peer system 110. Router 106 can provide ingress and ‘gress for both of poor systems 112 and 114, Pocr systems 110, 112, and 114 ean form a P2P file-sharing network. Ina 2P ile-sharing nework, For example, peer system 12 ea request a daa file from peer system 110. When peer system 110 has the data le, peer system ean provide the datafile peer system 112 ‘an embodiment, communications network 100 ca ‘include an originating server 116, monitoring node 118, and participating server 120, Peer system 110 can receive con- {ent fom originating server 116 or athersourees, and make the content avaiable w peer ystems 112 and 114 through the 2P network. For example, peer system 112 ean request the ‘content ffom peer system 110, and poer system 110 can provide the content peer system 112: Monitoring node 118 can inspec file-sharing tall from a subset of peer systems such as peer systems 112 and 114, and may identify the content requested by peer system 112. In an embodimen {deep packet inspoction can be used to identity the eontent oF ‘the data ile being shared between peer systems, Additionally, participating server 120canpartieipatein the P2P file-sharing network. After the monitoring node 118 has identified the content being shared through the P2P file-sharing network, participating server 120 ean download the eontent from peer ‘Systems currently providing the conten such as pocr system 110, from the originating server 116, 0 from other soureesof thecontent, The participating server 120 caa make the content available to other peer systems such as peer systems 112 and m4, ‘In an embodiment, providing the content from a server closer to the requesting peer systems can reduce network costs. Additionally, participating server 120 can gather infor ‘mation about the peer systems sharing the content, such asthe {entity ofthe peer systems, the distribution of peers provid- ing the content, the distribution of peers requesting the cone ‘ent, andthe ike. For example, the information ean be used 10 ‘optimize the P2P file sharing, improve network performance, ddoerease network costs, oF tack the propagation of files through the P2P network FIG, 2 illustrates a P2P system 200 for monitoring and actively panicipating in P2P distbution of dat fles. Peer 202 ean communicate with peer 204 through a router 206. ors 202 and 204 can be client system, such as client systex: 112. Router 206 can be similar to router 106. In an emiboai- sen, communication between poer 202 and peer 204 may travel through multiple routers, Funher, P2P system 200 can include a monitoring module 208 and participating server 210, Monitoring module 208 and participating server 210 can be implemented in hardware, software, or any combination thereo- Additionally, monitoring module 208 and pariiat- ing server 210 can be implemented on the same physical or virtual machine, separate viral or physical machines atthe ‘sme locaton, of separate physical machines at different Jocatons in the network. Further, the monitoring module 208 for the participating server 210 may be implemented a8 9 ‘comportent of router 206, ‘Monitoring module 208 can passively monitor traffic through router 206, Monitoring modi 208 can use packet section techniques to identify the port numbers and Inter- US 8,959,243 B2 3 net Protocol (IP) address for peers 202 and 204, Monitoring module 208 may identify P2P traffic based on destination or source port number, protocol analysis, other means known ia the art, or any combination thereof. Additionally, analysis of the conten ofthe packet or packets can be used to idem the ‘content othe data file being distributed. Monitoring module 208 can use the infomation gathered by inspecting the P2P teallic to identity ofthe content being shared. High impact ‘content can be content that utilizes significant amount of network capacity, such as large files that are repeatedly trans- Jered, files that are repeatedly transferred between subnets ‘and popular content tats frequently transmitted. Inanalter- nate embodiment, specific content may be identified. For ‘example, a content owner may provide a list of content licensed for active participation oF a list of content not Ficensed for distribution Participating server 210 can actively participate in P2P lisiibuton of the high-impact content, Participating server 210 can ideatly peers thst have the content available, For ‘example, the partieipating server 210 may request the content from peer 204. In nother example, the BitTorret protocol say be used for transfering the dat file and the participating server 210 may connect toa tracker receive a lis of peers ‘curently transferting pieces ofthe data ile. Additionally, the participating server 210 can make the content avaiable for ‘download, such as by serving requests forthe content peer 202, or by notifying the tracker thatthe participating server 210; pieces ofthe dat ile to transfer. Further, the partici pating server 210 may maintain a list ofthe IP addresses of peers providing the high-impact content and pecrsroquesting the high-impact content. Inan embodiment, the participating server 210 may refise to setve a request from a peer for ‘exchided contet. In another embodiment, content distiba- tion information, such asthe numberof peers requesting the ‘content, the distribution ofthe peers having the conten, the ‘identity of the posts participating in the distribution of the ‘content, and the like, may he wsed to distribute the shared ‘content across multiple participating servers 210 thoughout the nonwork, such as to minimize network costs, The content distribution information may also be provided to the content ‘owner, such as for accounting and billing purposes. IG. 3 shows a low diagram illustrating a method for P2P. disiibuton of high-impact content. At 302, P2P walle may be analyzed, such s by monitoring module 208, The analysis ‘ofthe P2P tafe can include determining the pees involved, jn the distribution ofthe content, the identity oF the contest, the size ofthe content, the impaet ofthe distribution of the ‘content on the network, and the ike. At 304, high-impact, ‘content can be identified. High-impact content can include ‘content having significant effect on network resources, such ss through heavy sharing, significant sharing across sub-nel- Works, sharing larg files, ad the like, In aa embodimeat, high-impact content ean include content licensed for active participation, exeluded content, of any combination thereof. ‘AL 306, peers providing the high-impact content can be identified. For example, peers providing the high-impact con- tent can be identified, such as based on an IP addres. The peers may be identified as.a potential source for retrieving the high impact content. At 308, the high-impact content can be relseved from the identied peers. Alternatively, requests for the high-impact content can be sent. numberof peers. The peers may be selected based on the network costs associated ‘with recelvng the content fom the poors. Additionally, poors responding tothe request with the high-impact content canbe ‘denied as peers providing the high-impact content. At 302, ‘additional P2P tlic can be aualyzed. 0 o 4 At310, the high-impaet content can be provided on a local peer server, such as participating server 210. The local peer Server may provide the content to peers within the same subnet moreeficontly than pee in another subnet. As such, providing the high-impact eontenton the local peer serverean redice network usage and decrease the time required forthe peer to download the content. AU312, pects downloading the high-impact content can be identified. For example, pecrs downloading the high-impact content ean be identified based ‘on the IP address. At314, pees dewwaloading the high-impact ‘content fom 2 non-Tocal source ean be directed to the Focal peer serverto reduce the time for retrieving the contet and to rede the impact on the network, For example, the eonnec- tion tothe local peer server may be more reliable than the connection to a non-leal poet, and downloading peers may preferably request content from the local peer server. la an ‘embodiment, peers ean be identified based on the requests for ‘content from the local peer server. In another embodiment, peers requesting content froma non-local peer, or peers eure rely downloading content from a non-local peer, may be redirected, such as by a router, to the local poe. In yet another embodiment, connections to non-local poers for reriving high-impact content available onthe local pee server may be Timited to reduce network impact and encourage retrieving. the content from the local poor server FIG. 4 shows a flow diagram illustrating an alternative ‘method for P2P distribution of content. At 402, P2P traffic ‘may be analyzed, such as by monitoring module 208, The analysis ofthe P2P trafic ean include determining the peers involved in the distribution ofthe content, the identity ofthe content, the sizeof the content, the impact af the distribution of the content on the network, andthe like. At 404, content ‘casing significant trafic between subnets can be identified For example, when peers providing the content ae generally located in aseparate subnet from peers requesting ae content the traffic between the subnets can be significant, In an embodiment, the content can include content licensed for active participation, excluded content, or any combination ther. ‘AL-406, peers providing the content can be identified as 2 potential Source for erieving the content For example, the IP address of peers providing the content can be identified. Additionally, the location within the network cam be deter- ‘mined based on the IP adress ofthe peer and the topology of the network. At 408, the content can be retrieved from the identified peers, Altematively, requests forthe content can be sentto aniimber of peers, eer responding othe request With ‘the conteat canbe identified as peers providing the content. In ‘anembodiment,a local peer server located close o requesting peers can retrieve the content from the serving peer. Alterna tively, retrieving the content from another peer server may be ‘more elicent than retrieving from the serving pee. "ALAIO, the content can be provided ona local peer server, such as pariipating server 210. The local peer server may provide the content to peers within the same subnet more efficiently than can a peer in another subnet. As such, provid- ‘ng the content onthe local peer server ean reduce network usage and decrease the time required forthe peer to download the content. At 412, peers downloading the content can be {dentifed. For example the IP adresses For peers download- ing the content can be deteraied. A'414, poers downloading the content from # non-local source ean be directed to the local pooe server reduce the time for retrieving the content and to reduce the impact on the network. For example, the ‘connection to the local pee Sever may be more reliable than the comection to a nonelocal peer, and downloading pecrs y preferably request content fom the local peer serve. In US 8,959,243 B2 5 an embodiment, peers canbe ientifed based on the requests or conteat from the loeal peer server FIG. § shows a flow diageam illustrating another embodi- sent ofthe method for P2P distribution of high-impact com- teal. At $02, BivTorent raffle may be anilyzed, such as by ‘monitoring module 208, The analysis ofthe i Torrent traffic ‘can include determining the peers involved inthe distribution ‘of the content, the identity of the conten, the size of the ‘content, the impaet of the distribution of the content oa the network, and the lke. At $04, high-impact content can be ‘entified. Ac 506, 2 torrent file forthe high-impaet content ‘ean he retrieved, The torrent file can inelude the identity of a tracker or trackers maintaining ist of pees curently trans- erring piooes ofthe dat le. At S08, de list of peers can be retrieved from the tracker. At S10, the high-impact content ‘can be retrieved from the peers identified in the list. In an ‘embodiment, pieces of the data file may be preferentially retrieved from peers closer inthe network or poces having 2 lower network cost. At $02, additional P2P teale ean be 2 anilyzed ‘ALS10, the high-impact content canbe provided on a local peer server, such as participating server 210. The local pece erver may provide the content to peers within the same subnet more eficenty than peer in another subnet. As such, providing the high-impact onteat on te local peer server ca rexluce nework usage and decrease the time roquired forthe peer to download the content, The local peer server may hoviy the tracker that the local peer server has the high- Jmpaet content available for downloading. At $12, poors downloading the high-impact content can be identified. Por ‘example, the IP addresses of peers downloading the high- ‘impact content can be determined. Additionally. the ication ‘of the peers can be determined based on the IP address. At S14, peers downloading the high-impact content from a non- Jocal source can be directed othe local peer server to reduce the time for retrieving the content and io feace the impact on the network. Ina embodiment, content requests from non- local peers to the lneal peer server may be refuse. FIG. 6 shows anilusteative embodiment ofa general com= putersystem 600, The computer system 601 can incide n sct ‘of instoctions that ean be executed to cause the computer system to perform any one or more of the methods or com- puterbased functions disclosed herein, The computer system {600 may operateas a standalone deviee ormay be coanected. such as by using a network, to other computer systems oF peripheral devices. In a networked deployment, the computer system may ‘operat inthe capacity ofa server or ascent user computer Jn a servercliont user network environment, of a8 & pect ‘computer system in a P2P (or distributed) network environ ment. The computer system 600 can also be implemented as ‘or incorporated into various devices, such as a personal com- puter (PC),a tablet PC, an STB, a personal digital assistant (PDA), a mobile device, a palmtop computer, laptop com- puter, a desktop computer, a communications device, 2 wi Jess telephone, a landline telephone, a control system, ‘camera, a seanner, a facsimile machine, a printer, pager, 3 personal trsted device, a web appliance, a network router, ‘witch or bridge, orany other machine capableof executing 3 set of instructions (sequential or otherwise) that specify ‘ction tobe taken by thst machine. In a particular embodi- ment, the computer system 690 can be implemented using ‘electronic deviees that provide voiee, video or data commit nication. Further, whilea single computer system 600isilus- trated, the term “system” shall also be takea to incl any collection of systems or sub-systems that individually oF 0 o 6 jointly execute a set, or multiple ses, of instructions to per orm one or more computer functions. ‘The computer system 600 may include a processor 602, suchas acentral processing unit(CPU),a graphiesprocessing ‘unit (GPU), oF bath, Moreover, the computer system 600 can Jnclude a main memory 60M and a static memory 606 that can ‘communicate with each other via'a bus 608. As shown, the ‘computersystem 600 may further include a video display nit {610 such 36a iguid crystal display (LCD), an organic light cemiiting diode (OLED), a fat panel display, a solid-state splay, or a eahode ray tube (CRT), Adltionaly, the com- puter system 600 may include an input device 612 such as 2 keyboard, and a eusor control device 614 such as a mouse Alternatively, input device 612 and cursor control device 614 ‘an be combined ina touchpad or iouch sensitive sereen The ‘computer system 600 canals include disk deve unit 616, 2 signal generation device 618 such as a speaker or remote control and a network interface device 620 to communicate ‘with anetwork 626. na paticularembodiment, the disk rive ‘unit 616 may include # computer-readable medium 622 ia ‘which one or more sets of instructions 624, suchas software, can be embedded, Further, the instictions 624 may embody fone of more of the methods oF logic as described herein In a particular embodiment, the insinitions 624 may eside com- pletely, or at least partially, within the main memory 604, the atic memory 606, andlor within the procestor 602 dring execution by the computer system 600, The main memory {608 an! the processor 602 also may’ include computer-read- able mest “The illustrations ofthe embodiments described heroin are intended to provide a general understanding of the stuctare fof the various embodiments. The illustrations are not intended to serve a¢ & complete description af all of the elements and features of apparatus and systems that utilize the structures or methods described herein. Many other embodiments may'be apparent to those of skill ia the set upon reviewing the dislosure, Other embodiments may be wilized ‘and derived from the disclosnre, such that stmetral and logical substitutions and changes may be made without ‘departing from the seope of the diselosure, Additionally, the ilkistations are merely representational and may aot be ‘dawn to seal. Certain proportions within the illustrations ‘may be exaggerated, while other proportions may be mini- mized, Accordingly, the disclosure and the FIGs, are to be regarded a illustrative rather than rstitive, “The Abstract ofthe Disclosure is provided to comply with 37 CER. $1,720) and is submitted With the understanding tat it will not be used to intemret or limit the scope or ‘meaning ofthe claims. In addition, inthe foregoing Detailed Description of the Drawings, various features may be aroupod together or described in a single embodiment forthe purpose of streanlining the dsslosure. Thi dielosure isnot to be interpreted as reflecting a intention thatthe claimed cembodinients require more features than are expressly recited in each claim, Rather, a the following claims reflect, inven- tive subject matter may be directed to Jess than all of the ‘eatures of any ofthe disclosed embodiments. Thus, the fol Jowing claims are incorporated into the Detailed Deseription of the Drawings, with each claim standing on its own as defining separately claimed subject matte, ‘The above disclosed subjest mater is to be considered illustrative, and not restrictive, and the appondod claims are intended 1 eover all sich modifications, enhancements, and ‘ther embodiments wich fall within the trae sprit and seope ofthe present disclosed subject mater. Thus tothe maximum extent allowed by law, the scope of the present disclosed subject matter isto be determined by the broadest permissible US 8,959,243 B2 1 nerpretation of the following claims and their equivalents, ‘an shall not be resticteor listed by the foregoing detailed “description, ‘What is claimed is 1. computer implemented method comprising: ‘dentfying, hy ullizing instructions from memory tht are executed by a processor, a plurality of shared content items by inspecting peer-to-peer tai ow using deep packet inspection; seleting, by utilizing the processor, one of the shared ‘content items basedon inspecting the peer-to-peer tralic flow, wherein the one shared content item is selected when the one shared content item is popular shared ‘content, s content having a significant efleeton network resources, and is content witha lange file size that is repeatedly ansferred, and wherein the one shared con tent item s selected by being ina st of content fiensed for ative participation ‘identifying, by utilizing the processor, a source peer pro> viding the one shared content item: downloading the one shared content item ata peer server from the source peer adding by uilizing the processor, he peer servertoalistol peers curently transferring portions of the ane shared Content item, wherein the one shared content item includes an identity of a tracker including the list of peers currently transfering portions of the one shared content item: ‘wansmitting, by utilizing the processor, a notification tothe tracker that the peer server bas the one shared caateat item avaiable for downloading: redirecting by utilizing the processor, a request for theone shared content item to the peer server, whercin the request is made by a requesting peer of a plurality of requesting peer and the request is redirected tothe peer server based on the peer server being in the ist of pers currently transfering the ponions of the one shared ‘identifying, by wilizing the processor, the requesting pect ‘based on the request forthe oneshared content item: and sroviding the one shared content item from the peer server Toa subse of the plurality of requesting peers in same subnet asthe peer server. 2. The method of claim 1, wherein the subset of the plural- ty of requesting peers is Jetermined based on a network topology. '3.A.computer implemented method comprising identifying. by ullzing instructions from memory that are utilized by @ processor, a plurality of shared eootent items by inspecting pee~4o-peer trafic ow: selecting, by alilizing the processor, one of the shared ccntent items based on inspecting the peer-to-peer rafle flow; wherein the one shared content item is selected ‘when the one shared content item is popular shared content, content havingasignifieanteflecton network resources, and is content With lang file size tht is ‘repeatedly transferred, and wherein the one shared con- {ent itemis selected by being ina list of content licensed for ative participation ‘dentfying, by utilizing the processor, a souree peer pro> viding the one shared content item, wherein the one Shared content item ineludes an identity of a tracker ‘ncldinga list of peers curently transferring portions of ‘the one shared content item 0 o 8 downloading the one shared coateat item sta poer server {fem the source peer based on network costs associated ‘with reeeiving the one shared content item from the source poor, - ‘transmitting, by utilizing the processor, anotfication tothe tracker thatthe peer server has the one shared content item available for downloading; receiving a request forthe one shared content item atthe peer server froma roquesting peer, whereinthe requests received by the peer server based on the peer server being ina list of peers curently transtering portions of the one shared eontent item; and ‘identifying, by wilizing the processor, the requesting peer ‘based on the request fr the one shared content item. 4.Themethod of claim 3 futher comprising providing the ‘one shared content item fo the requesting pee, '. The method of elaim 3, wherein the one shared content item is excluded content, 6A method comprising inspecting by ulizing instructions from memory dat are ‘Sxected by a processor, peer-to-peer traffic of partic ‘ating peers using deep packet inspection to identify a pluzality of shared content items; selecting, by utilizing the processor. one of the shared ‘content items based om inspecting the peer-to-peer tra fie, wherein he one shared coatent item isselected when the one shared content item is popular shared contents ‘content having a significant effet on network resources, land is content with a large filesize that is repeatedly ‘wansferred, and wherein the one shared content item is selected by being ina ist of eontent licensed for active participation: identifying, by utilizing the processor, source peers having the one shared content item, the source peers being clifferent than the participating peers; downloading, ata server, the one shared content item from the soures poor; providing the one shared content item: ‘adding, by utilizing the processor, the server to a lst of ‘peers currently transfering portions of the one shared content item, wherein the one shared content item inchides an identity of a tracker incloding the list of peers currently transfering portions of the one shared ‘sonteat item; ansenitting, by uilzing the processor, snotfication tothe ‘tracker thata peer server has the one shared content tem available for downloading; ‘identifying, by ulizing the processor, a requesting peer ‘other than the participating peers requesting the one shared content item and the server boing on the list of peers: and rodircting by wilizing the processor, the requesting peer o theserver for theone shared content item based onthe server being in thelist of peers curently transfering the portions of one shared conten item. 7. The method of elaim 6, wherein the one shared content item is provide to the requesting peer. '8. The method of elaim 6, wherein the one shared content item matches a list of eontent provided by a content owner, 9. A computer implentented method comprising inspecting by ulizng instructions from memory that are ‘excoted by a processor, peer-to-peer trafic of partic pating peers to identify a plurality of shared content selecting, by utilizing the processor, one of the shared ‘content items hase on inspecting the poerto-pece tra fie, wherein the shared content item i selected when the US 8,959,243 B2 9 shared content item is popular shared conten, content having a significant effect on network resources, ad is content with a large lle size that is repeatedly trans- ferred, and wherein the shared content item is selected by being in a list oF content license for active partic pation: ‘denifying, by uilizing the processor, source peers pro- viding the one shared conteat item, the source peers being dierent than the paricipating peers, wherein the ‘one shaved coateat tem includes an identity ofa tracker including alistof peers curently transfering portions of the one shared content ites ‘eansmittng, by ullizing the processor, a notification tothe ‘tracker hata peer servers the one shared cote item available for downloading seestng by izing the proceso, eer oer han he participating peers hased on network costs associ eet nese conteatn fot er, sending, by utilizing the processor, a request for the one shared eontent item tothe peer other than the paticipat- ing peers, wherein the request is sent to the poer other than the participating poers based on the peer other than ‘the participating peers being in the lst of peers currently transferring portions of the one shared content item; receiving a response tothe request ad ‘obtaining, by ulizing the processor, source information| about onc of the source poets providing the one shared {eantent item based an the response 10. The method ofeloim9, wherein the source information includes one of location ofthe source poor an identity ofthe source poet, and any combination theeor. 1. Themethod of claims, furher comprising detemnining ‘content distribution information for the one shared content item, wherein the content distribution information includes 2 istibuton of one of a plurality of source peers, interact protocol addresses ofthe plurality of source peers, cation oF the plurality ofsource peers, and any combination thereof. 12. The method of elaim9, wherein the one shared content item matches a list of content provided by a content ownee, 13. computer implemented method comprising: inspecting, by utilizing insteuctions from memory that are ‘exceed by a processor, poerto-poer traffic of partici= pating peers 10 ying, by wilizing the processor, a plurality of shared ‘content items based on inspecting peer-to-peer trae selecting, by utilizing the processor, one of the shared ‘content tems hase on inspecting the pocrto-pecetral= fie, wherein he one shared content item isselectod when ‘the one shared content tem is popular shared content, is content havinga significant effet on network resources, is content with a lage file size that is repeatedly trans- ferred, snd wherein the one shared content stem is selected by being ina is of eontent licensed for active participation: snaking the one shared conten item available fr a local server, wherein the one shared content item inclodes an identity of a tracker including a list of peers currently ‘tansferring portions of the one shared content item: ‘transmitting, by uilzing the processor, notification tothe ‘wacker thata peer server as the one shared content ite available for downloading; receiving requests for the One shared content item from requesting peers; ‘oblaining, by utilizing the processor, requestor information ased on the requests: dentilying, by utilizing the processor, the requesting peers ‘downloading the one shred content item based om the ‘requestor infomation: and redirecting, by utilizing the processor, the requesting peers to the local server based on the requesting peers down loading the one shared content item and based on the local server being inthe list of poers currently transfer ring portions of the one shared content item, 14. The method of claim 13, wherein the requestor infor ‘mation includes one ofa location of the requesting peer, an ‘deity of the requesting pee, and any combination thereof. 18. The method of claim 13, further comprising determin- ‘ng content distribution information for the one shared con- {eat item, wherein the content distribution information includes distribution ofa plurality of roquostng pers, inter- et protocol addresses ofa plurality requesting peers, location ‘of the plurality of requesting peers, or any combination thereot 16. The method of claim 13, wherein the one shared con- tent item matches a Hist of eontent provided by a content idk

You might also like