Date Completed: August 2009
This Tech Report deals with Peer-to-Peer protocols. We start by giving a brief account of history of P2P applications and then cite from some of the P2P traffic measurement studies. P2P traffic identification methods and the recent P2P traffic optimization schemes constitute the core of this report, in which we examine the state-of-the-art in this field.