Characterizing the network behavior of P2P traffic
|
|
- Shonda Hicks
- 5 years ago
- Views:
Transcription
1 Characterizing the network behavior o PP traic Raaele Bolla, Marco Canini, Riccardo Rapuzzi, Michele Sciuto DIST - Department o Communication, Computer and System Sciences, University o Genoa Via Opera Pia 3, 5 Genova, ITALY {raaele.bolla, marco.canini, riccardo.rapuzzi, michele.sciuto}@unige.it Abstract Nowadays the majority o Internet traic is generated by peer-to-peer (PP) ile sharing applications. As the popularity o these applications has been increasing dramatically over the past ew years, it becomes increasingly important to analyze their behavior and to understand their eects on the network. The ability to quantiy their impact on the network is undamental to a number o network operations, including traic engineering, capacity planning, quality o service, orecasting or long-term provisioning, etc. We present here a measurement study on the characteristics o the traic associated with two dierent PP applications. Our aim is to provide useul insight into the nature o PP traic rom the point o view o the network. To achieve this, we introduce a novel meauserement, Content Transer Index (), to distinguish two classes o behavior associated with PP traic: the download and the signaling traic proile. Next we apply the to our data sets and show that it eectively oers a general characterization o PP traic. Finally, we present a number o statistical measurements that are signiicantly unbiased due to having considered the distinction between the two classes. To the best o our knowledge, this is the irst study to ollow this approach. We believe such a study will help researchers better understand the impact o PP applications on the network and how to improve their perormance. I. INTRODUON Nowadays peer-to-peer (PP) ile sharing applications constitute a major share o the total traic in the Internet []. PP traic is believed to be hazardous or networks, not only because o its high traic volume, but also the transer o large iles. As the popularity o these applications has been increasing dramatically over the past ew years, it becomes important to analyze their behavior and understand their eects on the network. In particular, quantiying their impact on the network is important to a broad range o network operations, including traic engineering, capacity planning, quality o service, orecasting or long-term provisioning, etc. Recent works ([], [3] and []) have shown that accurate identiication o PP traic is challenging because PP applications, particularling the newer generations are incorporating various strategies to avoid detection. The ability to identiy PP traic is undamental to quantiy the impact o PP applications. However, it only represents a irst step towards ully understanding their behavior and eects on the network. We present here a measurement study on the characteristics o the traic associated with two dierent PP applications. Our aim is to oer useul insight into the nature o PP traic as it is seen rom the point o view o the network. To achieve this, we introduce a novel measurement, Content Transer Index (), that distinguishes two classes o behavior or the PP traic: the download and the signaling traic proile. We applied the to our data sets and we show that it eectively oers a general characterization o PP traic by presenting a number o statistical measurements. Our results show that the download traic is, as expected, the majority o the total traic volume. However, because o the large number o signaling communications, simple statistical measurements applied to the entire traic aggregate are biased as they ail to capture the real behavior o PP traic. Because o the large dierences between these two types o traic, we argue that a comprehensive PP traic characterization should include this distinction. As a preliminary validation, we compared the s outcome, speciically the edonkey downloads, against the ground truth built using the methodology presented in [5], resulting in an accuracy o above 95%. The remainder o this paper is organized as ollows. Section II describes how we identiied PP traic in our data sets. Section III gives a brie overview o the edonkey and BitTorrent PP networks. Section IV presents our characterization o PP traic, and the results o its application to a number o measurements are shown in Section V. Finally, Section VI concludes the paper. II. DATA COLLEON We analyzed traces that were collected using an optimized Linux-based open router [] turned into a monitoring box. The monitor was located at two dierent links o the University s campus network. For both traces, we captured every packet seen on each direction o the links along with its ull payload and we removed the link layer header (ethernet). To capture the irst trace (DEPT), the monitor was located on the link connecting our department to the campus network. The second trace (GENUA) was captured by monitoring the main connection to the Internet. Being a data set that spans over two weeks, the DEPT trace is our reerence trace, whereas GENUA is used to conirm our indings. We post-processed the trace in order to exclude the TCP connections or which we do not observe the canonical set up (triple handshake). Table I lists general workload dimensions o our data sets: counts o distinct source and destination IP addresses, and the number o lows, packets, and bytes observed. The optimizations include using the Linux NAPI s polling mode and tuning the network card s RX ring buer and the OS s socket buers.
2 TABLE I GENERAL WORKLOAD DIMENSIONS OF OUR TRACES. Set Dur. Src. IP Dst. IP Flows Packets Bytes DEPT 9h.8M 5.9M M M 738GB GENUA h K 53K 97K M.5GB In this study we deine lows as unidirectional, while we use the term conversation to denote bidirectional traic, i.e., a conversation is composed by two lows: traic rom A to B, and traic rom B to A. Each low is always identiied by two end points consisting o {IP, port} pairs and the transport level protocol. For a protocol like UDP, which is not connection oriented, we use a timeout o s to determine the end o a conversation. We used two open source tools, namely l7-ilter [7] and ippp [8], to classiy the PP traic in our traces. Both these tools identiy PP lows via pattern matching, i.e., searching the payload content o the packets or known protocol signatures. These classiiers act every time a packet is received, and mark a conversation as classiied as soon as they ind a known pattern in one direction. For scalability reasons, only up to the irst N packets o each conversation are tested, where N is a user conigurable parameter. These tools dier in the way the pattern matching is realized: l7-ilter reassembles the packet payloads into a buer (there is one buer or each direction), stripping the null bytes, and uses regular expressions to search the buer or strings containing a match to a known protocol signature; ippp searches each individual packet or known patterns o the most common PP protocols. Many o the signatures used by l7-ilter and ippp are obtained rom protocol speciications. However, because this is not generally possible or proprietary protocols, they are in some cases derived rom reverse engineering the protocols, like what has been done by the authors o []. Because these tools are not available as o-line trace processing tools (they are originally meant to be deployed as ilters in the Linux s iptables irewall or traic shaping purposes), we ported their source code to the Click modular router [9], which turned out to be a viable analysis ramework. We validated our versions o the tools against the original tools by comparing the results obtained rom the classiication o the GENUA data set. The outputs were indeed the same. We exploited both these tools to accurately identiy PP traic in our data sets. As done in [3], we limited to the number o packets per low searched or signatures. By running the tools on our traces, we ound that the dierences in their classiication results were negligible, thereore we only used ippp. Finally, we compared the classiication results obtained with our ippp classiier with the output o the payload classiier used to validate BLINC [], obtaining very close results on our data sets. Table II presents the volumes o PP traic in our traces, divided by PP application. In the remainder o the paper we only ocus on the traic TABLE II BREAKDOWN BY PROTOCOL OF PP TRAFFIC VOLUME IN OUR TRACES. PP Protocol GENUA DEPT BitTorrent 9.7%.9% edonkey 7.33% 73.55% Gnutella.78%.% KaZaA.%.% DirectConnect 7.%.% WinMX.%.% generated by edonkey and BitTorrent, since the majority o PP traic in our campus network is associated with these two applications. III. EDONKEY AND BITTORRENT OVERVIEW In this section we briely present the main eatures o edonkey and BitTorrent. edonkey: The edonkey network belongs to the class o hybrid PP architecture: it is composed o peers and multiple servers. The servers provide a ile search service and maintain a list o addresses o other servers, to be distributed to peers. Each peer logs on to one o the servers (using a TCP connection) and registers its shared iles with it. To search a ile, a peer sends the query to its main server which replies with a list o matching iles and their location. Optionally, the peer can send urther queries directly to other servers via UDP. To download a ile, a peer establishes direct TCP connections to the peers that are sharing the requested ile. During download, iles are split into separate pieces. Pieces o the same ile can be obtained rom several dierent peers. Finally, a ile can be shared by a peer beore it is completely downloaded. BitTorrent: BitTorrent is a ile distribution system based on the PP paradigm. Unlike other popular PP networks, such as edonkey or Gnutella, which comes with a ile search service, the sole objective o BitTorrent is to quickly replicate a single large ile to a set o clients. There is a separate torrent or each ile that is distributed. A torrent consists o a central component, called a tracker and all the currently active peers. The role o the tracker is to act as a rendez-vous point or the peers o the torrent, however it is not involved in the actual distribution o the iles. Once a peer joins a torrent, it irst contacts the tracker to retrieve a list o active peers. It then cooperates with - peers chosen at random to replicate the ile among each other. Although there are unoicial extensions to support UDP communications, by deault, BitTorrent only uses TCP. IV. PP TRAFFIC CHARACTERIZATION PP traic can be roughly divided into download traic and signaling traic: the irst is caused by the transer o content, PP traic is believed to be hazardous or networks, and our campus network makes no exception. We are aware that a iltering system has been deployed, realizing traic shaping or the most common PP applications.
3 the latter is mainly due to the presence o an overlay network, and possibly a search service. Because o the large dierences between these two types o traic, we argue that a comprehensive PP traic characterization should include this distinction. In act, even though the download traic is generally the major share o the total PP traic volume, i such distinction is not taken into account, then, because o the large number o signaling conversations, simple statistical measurements are biased. A way to accurately dierentiate download vs. signaling traic would be to implement a protocol analyzer. Although one can leverage existing tools, e.g. binpac [], to build protocol analyzers, this solution has several drawbacks: (i) it requires speciic knowledge o PP protocols, (ii) it needs access to the payload o each packet, (iii) it has to maintain a state or each conversation. In particular, we are interested in characterizing the PP traic rom the point o view o the network, i.e., to gain more insight on the distinctive characteristics o the behavior o aggregates o download and signaling PP conversations, including the volumes o carried content, the conversations interarrival times and durations. We point out that it is not our intention to provide a method that deterministically divide PP conversations into the two categories. Thus, we ollow a novel approach that doesn t rely on the accuracy o the solution based on protocol analyzers, but provides a means or clearly distinguishing two dierent classes o behaviors and or treating PP traic with generality. We call such classes o behaviors the download and the signaling traic proiles. To some extents we re abusing this terminology, as it is possible, though not common, that a download conversation exhibits the typical characteristics o signaling traic and vice-versa. For example, early truncated downloads are not clearly distinguishable rom signaling conversations. However, we accept such misclassiications because misclassiied lows don t bias our measurements and we want to keep our method simple. Our approach consists o a way to oer a statistical characterization o PP traic through the ormalization o a measurement index. We now deine the Content Transer Index (CT I) o a conversation C as: F + F P MSS(C) + + F p [, ], MSS(C) where F, are the lengths o the two lows constituting C, such that F. One can use three dierent low eatures to represent its length: the packet count, the count o payload bytes and the count o headers and payload bytes. However, in this paper, we only present the results obtained by using the count o payload bytes as the low length. P and p represent the average number o payload bytes per packet calculated or the low with length F and respectively. The maximum segment size (MSS) o the conversation C is expressed with MSS(C). For the UDP, we assume that the MSS corresponds to the maximum transer unit (MTU) minus the IP and UDP headers lengths. Hence, given the pair o end points {A, B}, the gives us a measure o the way the content is transerred. At the opposite ends o the spectrum there are two distinct traic proiles: when the conversation is latter or balanced (i.e., A and B exchange an even quantity o content, mainly using packets whose payload size is ar rom the MSS), then the s value tends to zero; when the conversation is richer o content which is either transerred rom a single end point that dominates the conversation (unbalanced), or eiciently exchanged between the end points, then the s value tends to one. The intuition behind the proposed metric derives rom observing that the traic proiles o download and signaling conversations are quite dierent. The idea is that, during a ile download, a peer, on average, gets packets illed up to the MTU and sends back ewer packets to acknowledge the received data. Even when the peers are exchanging pieces o a single ile with one another (as realized in BitTorrent), causing balanced conversations, still, the average payload size tends to reach the MSS. On the contrary, the signaling conversations are characterized by a latter proile, consisting o a more even count o exchanged bytes and packets. Throughout the rest o the paper, we divide PP traic into signaling vs. download by using the value o the conversation s. In particular we use a threshold to distinguish the two traic types: a conversation with a s value above the threshold is marked as download, while a value below the threshold determines a signaling conversation. To validate our metric, we classiy edonkey conversations in our DEPT data set into download and non-download. A conversation is marked to belong to the download category i the conversation contains at least one o the edonkey protocol opcodes OP SENDINGPART or OP COMPRESSEDPART. We computed the accuracy as the number o correctly classiied download conversations over the total count o conversations. We ound that using. as the threshold, we correctly classiy 95% o the download conversations (i.e., 95% o the download conversations have greater than.). The value. appears to the common break point to the graphs in Figure and we choose to use it in the rest o the paper. The limit o this validation is that we are unable to accurately identiy signaling conversations rom the ones classiied as non-download, because some download conversations might end up being in the non-download category. However, we obtain that only the.5% o non-download conversations have s value above the threshold and that there is a dierence o one order o magnitude between the average packet size, volume and duration o the non-download conversations above the threshold and those below it.
4 [%] 5 3 F [%] 5 3 F (a) edonkey - DEPT (b) edonkey - GENUA 35 3 F F+ [%] [%] (c) BitTorrent - DEPT (d) BitTorrent - GENUA Fig.. Relationships between the conversations, payload bytes and the o (a) edonkey conversations in DEPT, (b) edonkey conversations in GENUA, (c) BitTorrent conversations in DEPT and (d) BitTorrent conversations in GENUA. The histograms are plotted with bin size.. A. graphs V. PP TRAFFIC ANALYZES Figure a, b, c and d show the relationships between the conversations, payload bytes and the o DEPT s edonkey, GENUA s edonkey, DEPT s BitTorrent and GENUA s BitTorrent TCP conversations respectively. Each igure shows three overlapping histograms, symbolizing the ollowing igures corresponding to the same range: the number o conversations, the summation o the minimum and maximum length lows o the conversations (denoted with F + ) and the summation o just the minimum length lows (denoted with ). All the graphs clearly show two distinctive proiles: the signaling proile containing most o the conversations is having values below., whereas the download proile dominated by the payload bytes above.. Also note in the signaling proiles that the conversations are quite balanced ( is almost F). B. Interarrival times Table III lists the average, standard deviation and maximum conversation interarrival times. TABLE III AVERAGE, STANDARD DEVIATION AND MAXIMUM CONVERSATION INTERARRIVAL TIMES [S] IN DEPT. Conversation Avg. Std. dev. Max edonkey sign edonkey down BitTorrent sign BitTorrent down The CDFs o both the edonkey and BitTorrent conversation interarrival times reveal an exponential decay, as shown in Figure. There is again a signiicant dierence or signaling and download conversations since downloads happen rarely. Note that the graphs or DEPT and GENUA are comparable even though they are two dierent points o aggregation. C. Durations Table IV lists the average, standard deviation and maximum conversation durations. The CDFs o both the edonkey and BitTorrent conversation durations, shown in Figure 3, reveal some interesting inorma-
5 CDF Arrival time [s] Fig.. (a) DEPT CDF Arrival time [s] (b) GENUA CDF o the observed edonkey and BitTorrent conversation interarrival times. CDF Duration [s] (a) DEPT Fig. 3. CDF Duration [s] (b) GENUA CDF o the observed edonkey and BitTorrent conversation durations. TABLE IV AVERAGE, STANDARD DEVIATION AND MAXIMUM CONVERSATION DURATIONS [S] IN DEPT. Conversation Avg. Std. dev. Max edonkey sign edonkey down BitTorrent sign BitTorrent down tion. First o all, the curves o the download conversations are very similar or both the protocols and both the traces. This is primarily due to the s capability to distinguish the nature o a conversation, regardless o the speciic PP protocol. The edonkey signaling conversation durations appear to be concentrated in a small range o values, while the BitTorrent one is distributed in a larger range o small values. VI. CONCLUSION AND FUTURE WORK In this paper we have presented a characterization o PP traic. We have introduced a new measurement, the, that can be used to distinguish two classes o behavior or the PP traic: the download and the signaling traic proile. We applied the to the edonkey and BitTorrent conversations in our data sets and we showed that it eectively oers a general characterization o PP traic. Finally, we presented a number o statistical measurements that are signiicantly unbiased because o the distinction in those two proile classes. In the uture, we want to extend the ormula to depend on the count o packets in the conversation in order to deal with small unbalanced conversations that would be classiied as download but are most likely going to be signaling. We re also interested to extend this work to dierent types o PP applications and apply the to dierent content such as audio and video. In a next step, we will deine a model based on the presented measures that can be used to generate PP traic aggregates. We ll also consider the possibility to build a PP traic classiier based on the temporal evolution o the. ACKNOWLEDGMENT This work was supported by the project INTERMEDIA NoE, in the rame o the EU IST FP Program, by MIUR- PRIN project FAMOUS Fluid Analytical Models O autonomic Systems and by MIUR-PRIN project RECIPE Robust and Eicient traic Classiication in IP networks. We also would like to thank CSITA or helping us during the work. REFERENCES [] S. Sen and J. Wang, Analyzing peer-to-peer traic across large networks, in Second Annual ACM Internet Measurement Workshop, Nov.. [] T. Karagiannis, A. Broido, N. Brownlee, kc clay, and M. Faloutsos, Is PP dying or just hiding? in IEEE GLOBECOM,. [3] S. Sen, O. Spatscheck, and D. Wang, Accurate, scalable in-network identiication o PP traic using application signatures, in Proceedings o the 3th international conerence on World Wide Web, May.
6 [] T. Karagiannis, K. Papagiannaki, and M. Faloutsos, BLINC: Multilevel traic classiication in the dark, in Proceedings o ACM Sigcomm, Aug. 5. [5] K. Tutschku, A measurement-based traic proile o the edonkey ilesharing service, in Proceedings o PAM, Apr.. [] R. Bolla and R. Bruschi, RFC 5 perormance evaluation and internal measurements or a Linux based open router, in Proceedings o IEEE Workshop on High Perormance Switching and Routing, Jun.. [7] l7-ilter, [8] IPPP, [9] E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek, The click modular router, ACM Transactions on Computer Systems, vol. 8, no. 3, pp. 3 97, Aug.. [] R. Pang, V. Paxson, R. Sommer, and L. Peterson, binpac: A yacc or writing application protocol parsers, in Proceedings o ACM Sigcomm Internet Measurement Conerence, Oct..
On the Double-Faced Nature of P2P Traffic
On the Double-Faced Nature o P2P Traic Raaele Bolla, Marco Canini, Riccardo Rapuzzi, Michele Sciuto DIST - Department o Communication, Computer and System Sciences, University o Genoa Via Opera Pia 13,
More informationMonitoring and Classification of Teletraffic in P2P Environment
Monitoring and Classification of Teletraffic in P2P Environment Raffaele Bolla, Riccardo Rapuzzi, Michele Sciuto DIST - Department of Communication, Computer and System Sciences University of Genoa Via
More informationA Method of Identifying the P2P File Sharing
IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications
More informationFirst Video Streaming Experiments on a Time Driven Priority Network
First Video Streaming Experiments on a Driven Priority Network Mario Baldi and Guido Marchetto Department o Control and Computer Engineering Politecnico di Torino (Technical University o Torino) Abstract
More informationTO meet the increasing bandwidth demands and reduce
Assembling TCP/IP Packets in Optical Burst Switched Networks Xiaojun Cao Jikai Li Yang Chen Chunming Qiao Department o Computer Science and Engineering State University o New York at Bualo Bualo, NY -
More informationBotCop: An Online Botnet Traffic Classifier
2009 Seventh Annual Communications Networks and Services Research Conerence BotCop: An Online Botnet Traic Classiier Wei Lu, Mahbod Tavallaee, Goaletsa Rammidi and Ali A. Ghorbani Faculty o Computer Science
More informationBLINC: Multilevel Traffic Classification in the Dark
BLINC: Multilevel Traffic Classification in the Dark Thomas Karagiannis, UC Riverside Konstantina Papagiannaki, Intel Research Cambridge Michalis Faloutsos, UC Riverside The problem of workload characterization
More informationAutomated Modelization of Dynamic Systems
Automated Modelization o Dynamic Systems Ivan Perl, Aleksandr Penskoi ITMO University Saint-Petersburg, Russia ivan.perl, aleksandr.penskoi@corp.imo.ru Abstract Nowadays, dierent kinds o modelling settled
More informationClassification Method for Colored Natural Textures Using Gabor Filtering
Classiication Method or Colored Natural Textures Using Gabor Filtering Leena Lepistö 1, Iivari Kunttu 1, Jorma Autio 2, and Ari Visa 1, 1 Tampere University o Technology Institute o Signal Processing P.
More informationCSE3213 Computer Network I
SE33 omputer Network I Service Model, Error ontrol, Flow ontrol, and Link Sharing (h. 5. 5.3. and 5.7.) ourse page: http://www.cse.yorku.ca/course/33 Slides modiied om lberto Leon-Garcia and Indra Widjaja
More informationA Hybrid Approach for Accurate Application Traffic Identification
A Hybrid Approach for Accurate Application Traffic Identification Thesis Defence December 21, 2005 Young J. Won yjwon@postech.ac.kr Distributed Processing & Network Management Lab. Dept. of Computer Science
More informationITU - Telecommunication Standardization Sector. G.fast: Far-end crosstalk in twisted pair cabling; measurements and modelling ABSTRACT
ITU - Telecommunication Standardization Sector STUDY GROUP 15 Temporary Document 11RV-22 Original: English Richmond, VA. - 3-1 Nov. 211 Question: 4/15 SOURCE 1 : TNO TITLE: G.ast: Far-end crosstalk in
More informationImproved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning
Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Timothy Glennan, Christopher Leckie, Sarah M. Erfani Department of Computing and Information Systems,
More informationNeighbourhood Operations
Neighbourhood Operations Neighbourhood operations simply operate on a larger neighbourhood o piels than point operations Origin Neighbourhoods are mostly a rectangle around a central piel Any size rectangle
More informationOverview. Introduction. Internet Worm. Defenses. Recent Trends. Detection and Propagation Modeling of Internet Worms
Overview Detection and Propagation Modeling o Internet Worms Ph.D. research proposal by: Parbati Kumar Manna Co-advised by: Dr. Sanjay Ranka and Dr. Shigang Chen Research opportunities in Internet worm
More informationFRM: An Alternative Approach to Accurate Application Traffic Identification
FRM: An Alternative Approach to Accurate Application Traffic Identification Young J. Won 1, Myung-Sup Kim 2, James W. Hong 1 1 Dept. of Computer Science and Engineering, POSTECH {yjwon, jwkhong}@postech.ac.kr
More informationApplying fair queueing and traffic shaping for Internet applications on top of ATM The LB_SCFQ algorithm
Applying air queueing and traic shaping or Internet applications on top o ATM The LB_SCFQ algorithm Abstract Fair queueing mechanisms give very promising results or ATM networks. Combining a air queueing
More informationA Classification System and Analysis for Aspect-Oriented Programs
A Classiication System and Analysis or Aspect-Oriented Programs Martin Rinard, Alexandru Sălcianu, and Suhabe Bugrara Massachusetts Institute o Technology Cambridge, MA 02139 ABSTRACT We present a new
More informationCan we trust the inter-packet time for traffic classification?
Can we trust the inter-packet time for traffic classification? Mohamad Jaber, Roberto G. Cascella and Chadi Barakat INRIA Sophia Antipolis, EPI Planète 2004, Route des Luciolles Sophia Antipolis, France
More informationBittorrent traffic classification
Bittorrent traffic classification Tung M Le 1, Jason But Centre for Advanced Internet Architectures. Technical Report 091022A Swinburne University of Technology Melbourne, Australia jbut@swin.edu.au Abstract-
More informationROBUST FACE DETECTION UNDER CHALLENGES OF ROTATION, POSE AND OCCLUSION
ROBUST FACE DETECTION UNDER CHALLENGES OF ROTATION, POSE AND OCCLUSION Phuong-Trinh Pham-Ngoc, Quang-Linh Huynh Department o Biomedical Engineering, Faculty o Applied Science, Hochiminh University o Technology,
More informationClassifier Evasion: Models and Open Problems
Classiier Evasion: Models and Open Problems Blaine Nelson 1, Benjamin I. P. Rubinstein 2, Ling Huang 3, Anthony D. Joseph 1,3, and J. D. Tygar 1 1 UC Berkeley 2 Microsot Research 3 Intel Labs Berkeley
More informationGame Traffic Analysis: An MMORPG Perspective
Appeared in ACM NOSSDAV 2005 (15th International Workshop on Network and Operating System Support for Digital Audio and Video) Game Traffic Analysis: An MMORPG Perspective (MMORPG: Massive Multiplayer
More informationCPSC 641: WAN Measurement. Carey Williamson Department of Computer Science University of Calgary
CPSC 641: WAN Measurement Carey Williamson Department of Computer Science University of Calgary WAN Traffic Measurements There have been several studies of wide area network traffic (i.e., Internet traffic)
More informationCS4/MSc Computer Networking. Lectures 4-5 Transport layer protocols TCP/UDP automatic repeat request
S4/MSc omputer Networking Lectures 4-5 Transport layer protocols TP/UDP automatic repeat request omputer Networking, opyright University o Edinburgh 005 Transport services and protocols provide logical
More informationAn MMPP-Based Hierarchical Model of Internet Traffic
An MMPP-Based Hierarchical o Internet Traic L.Muscariello, M.Mellia, M.Meo, M.Ajmone Marsan Dipartimento di Elettronica, Politecnico di Torino, Italy R. Lo Cigno Dipartimento di Inormatica e Telecomunicazioni,
More informationA Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy
Journal o Inormation Security, 2012, 3, 18-24 http://dx.doi.org/10.4236/jis.2012.31003 Published Online January 2012 (http://www.scirp.org/journal/jis) A Multi-Stage Network Anomaly Detection Method or
More informationCharacterizing Gnutella Network Properties for Peer-to-Peer Network Simulation
Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation Selim Ciraci, Ibrahim Korpeoglu, and Özgür Ulusoy Department of Computer Engineering, Bilkent University, TR-06800 Ankara,
More informationDecision Support Systems for E-Purchasing using Case-Based Reasoning and Rating Based Collaborative Filtering
Decision Support Systems or E-Purchasing using Case-Based Reasoning and Rating Based Collaborative Filtering ABSTRACT The amount o trade conducted electronically has grown dramatically since the wide introduction
More informationTOWARDS HIGH-PERFORMANCE NETWORK APPLICATION IDENTIFICATION WITH AGGREGATE-FLOW CACHE
TOWARDS HIGH-PERFORMANCE NETWORK APPLICATION IDENTIFICATION WITH AGGREGATE-FLOW CACHE Fei He 1, 2, Fan Xiang 1, Yibo Xue 2,3 and Jun Li 2,3 1 Department of Automation, Tsinghua University, Beijing, China
More informationAN 608: HST Jitter and BER Estimator Tool for Stratix IV GX and GT Devices
AN 608: HST Jitter and BER Estimator Tool or Stratix IV GX and GT Devices July 2010 AN-608-1.0 The high-speed communication link design toolkit (HST) jitter and bit error rate (BER) estimator tool is a
More informationImpact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes
Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Zhili Zhao Dept. of Elec. Engg., 214 Zachry College Station, TX 77843-3128 A. L. Narasimha Reddy
More informationIdentify P2P Traffic by Inspecting Data Transfer Behaviour
Identify P2P Traffic by Inspecting Data Transfer Behaviour Mingjiang Ye, Jianping Wu,KeXu,DahMingChiu 2 Department of Computer Science, Tsinghua University, Beijing, 84, P.R.China yemingjiang@csnet.cs.tsinghua.edu.cn,
More informationClassifier Evasion: Models and Open Problems
. In Privacy and Security Issues in Data Mining and Machine Learning, eds. C. Dimitrakakis, et al. Springer, July 2011, pp. 92-98. Classiier Evasion: Models and Open Problems Blaine Nelson 1, Benjamin
More informationRoad Sign Analysis Using Multisensory Data
Road Sign Analysis Using Multisensory Data R.J. López-Sastre, S. Lauente-Arroyo, P. Gil-Jiménez, P. Siegmann, and S. Maldonado-Bascón University o Alcalá, Department o Signal Theory and Communications
More informationEmpirical Models of TCP and UDP End User Network Traffic from Data Analysis
Empirical Models of TCP and UDP End User Network Traffic from NETI@home Data Analysis Charles R. Simpson, Jr., Dheeraj Reddy, George F. Riley School of Electrical and Computer Engineering Georgia Institute
More informationOverlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen
Overlay and P2P Networks Unstructured networks PhD. Samu Varjonen 25.1.2016 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find
More informationOverlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 20.1.2014 Contents P2P index revisited Unstructured networks Gnutella Bloom filters BitTorrent Freenet Summary of unstructured networks
More informationOverlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 19.1.2015 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find
More informationMAPI Computer Vision. Multiple View Geometry
MAPI Computer Vision Multiple View Geometry Geometry o Multiple Views 2- and 3- view geometry p p Kpˆ [ K R t]p Geometry o Multiple Views 2- and 3- view geometry Epipolar Geometry The epipolar geometry
More informationAn Optimized Method for Analyzing the Peer to Peer Traffic
European Journal of Scientific Research ISSN 1450-216X Vol.34 No.4 (2009), pp.535-541 EuroJournals Publishing, Inc. 2009 http://www.eurojournals.com/ejsr.htm An Optimized Method for Analyzing the Peer
More informationTree-Based Minimization of TCAM Entries for Packet Classification
Tree-Based Minimization of TCAM Entries for Packet Classification YanSunandMinSikKim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington 99164-2752, U.S.A.
More informationOn Veracious Search In Unsystematic Networks
On Veracious Search In Unsystematic Networks K.Thushara #1, P.Venkata Narayana#2 #1 Student Of M.Tech(S.E) And Department Of Computer Science And Engineering, # 2 Department Of Computer Science And Engineering,
More informationAn Efficient Configuration Methodology for Time-Division Multiplexed Single Resources
An Eicient Coniguration Methodology or Time-Division Multiplexed Single Resources Benny Akesson 1, Anna Minaeva 1, Přemysl Šůcha 1, Andrew Nelson 2 and Zdeněk Hanzálek 1 1 Czech Technical University in
More informationTHE FINANCIAL CALCULATOR
Starter Kit CHAPTER 3 Stalla Seminars THE FINANCIAL CALCULATOR In accordance with the AIMR calculator policy in eect at the time o this writing, CFA candidates are permitted to use one o two approved calculators
More informationReduce the False Positive and False Negative from Real Traffic with Intrusion Detection
Research Inventy: International Journal Of Engineering And Science Vol.05, Issue 01 (January 2015), PP: 09-14 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.com Reduce the False Positive
More informationVisualization of Internet Traffic Features
Visualization of Internet Traffic Features Jiraporn Pongsiri, Mital Parikh, Miroslova Raspopovic and Kavitha Chandra Center for Advanced Computation and Telecommunications University of Massachusetts Lowell,
More informationSVILUPPO DI UNA TECNICA DI RICONOSCIMENTO STATISTICO DI APPLICAZIONI SU RETE IP
UNIVERSITÀ DEGLI STUDI DI PARMA FACOLTÀ di INGEGNERIA Corso di Laurea Specialistica in Ingegneria delle Telecomunicazioni SVILUPPO DI UNA TECNICA DI RICONOSCIMENTO STATISTICO DI APPLICAZIONI SU RETE IP
More informationThe aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are
The aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are important requirements for developing programs that
More information13. Power Optimization
13. Power Optimization May 2013 QII52016-13.0.0 QII52016-13.0.0 The Quartus II sotware oers power-driven compilation to ully optimize device power consumption. Power-driven compilation ocuses on reducing
More informationProportional-Share Scheduling for Distributed Storage Systems
Proportional-Share Scheduling or Distributed Storage Systems Abstract Yin Wang University o Michigan yinw@eecs.umich.edu Fully distributed storage systems have gained popularity in the past ew years because
More informationA Large Scale Simulation Study: Impact of Unresponsive Malicious Flows
A Large Scale Simulation Study: Impact of Unresponsive Malicious Flows Yen-Hung Hu, Debra Tang, Hyeong-Ah Choi 3 Abstract Researches have unveiled that about % of current Internet traffic is contributed
More informationProfiling the End Host
Profiling the End Host Thomas Karagiannis 1, Konstantina Papagiannaki 2, Nina Taft 2, and Michalis Faloutsos 3 1 Microsoft Research 2 Intel Research 3 UC Riverside Abstract. Profiling is emerging as a
More informationA Fluid-Flow Characterization of Internet1 and Internet2 Traffic *
A Fluid-Flow Characterization of Internet1 and Internet2 Traffic * Joe Rogers and Kenneth J. Christensen Department of Computer Science and Engineering University of South Florida Tampa, Florida 33620
More informationResearch Progress for the Interest Control Protocol of Content-centric Networking
Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com Research Progress or the Interest Control Protocol o Content-centric Networing GAO QIANG, WANG WEIMING, ZHOU JINGJING Zhejiang Gongshang
More informationA Method of Sign Language Gesture Recognition Based on Contour Feature
Proceedings o the World Congress on Engineering and Computer Science 014 Vol I WCECS 014, -4 October, 014, San Francisco, USA A Method o Sign Language Gesture Recognition Based on Contour Feature Jingzhong
More informationA Requirement Specification Language for Configuration Dynamics of Multiagent Systems
A Requirement Speciication Language or Coniguration Dynamics o Multiagent Systems Mehdi Dastani, Catholijn M. Jonker, Jan Treur* Vrije Universiteit Amsterdam, Department o Artiicial Intelligence, De Boelelaan
More informationA STUDY ON COEXISTENCE OF WLAN AND WPAN USING A PAN COORDINATOR WITH AN ARRAY ANTENNA
A STUDY ON COEXISTENCE OF WLAN AND WPAN USING A PAN COORDINATOR WITH AN ARRAY ANTENNA Yuta NAKAO(Graduate School o Engineering, Division o Physics, Electrical and Computer Engineering, Yokohama National
More informationApplication Presence Fingerprinting for NAT-Aware Router
Application Presence Fingerprinting for NAT-Aware Router Jun Bi, Lei Zhao, and Miao Zhang Network Research Center, Tsinghua University Beijing, P.R. China, 100084 junbi@cernet.edu.cn Abstract. NAT-aware
More informationAbstract. I. Introduction
46th AIAA/ASME/ASCE/AHS/ASC Structures, Structural Dynamics & Materials Conerence 8 - April 005, Austin, Texas AIAA 005-83 M Intuitive Design Selection Using Visualized n-dimensional Pareto Frontier G.
More informationPERFORMANCE EVALUATION OF LAYER 4 SWITCHING IN IPv6 VERSUS IPv4
PERFORMANCE EVALUATION OF LAYER 4 SWITCHING IN IPv6 VERSUS IPv4 Daniel ZINCA, Virgil DOBROTA, Cristian Mihai VANCEA Technical University o Cluj-Napoca, Department o Communications, 26 Baritiu Street, 3400
More informationAnalysis of WLAN Traffic in the Wild
Analysis of WLAN Traffic in the Wild Caleb Phillips and Suresh Singh Portland State University, 1900 SW 4th Avenue Portland, Oregon, 97201, USA {calebp,singh}@cs.pdx.edu Abstract. In this paper, we analyze
More informationEarly Application Identification
Early Application Identification Laurent Bernaille Renata Teixeira Kave Salamatian Université Pierre et Marie Curie - LIP6/CNRS Which applications run on my network? Internet Edge Network (campus, enterprise)
More informationScalable overlay Networks
overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent
More informationENSC 427 SPRING 2011 FINAL PROJECT EXPLORING TRAFFIC FOR P2P FILE SHARING PROTOCOL USING OPNET GROUP 01
SFU Communication Networks ENSC 427 SPRING 2011 FINAL PROJECT EXPLORING TRAFFIC FOR P2P FILE SHARING PROTOCOL USING OPNET GROUP 01 Abhishek Dubey ada4@sfu.ca Ashkan Mirnabavvi amirnaba@sfu.ca Vikas Yadav
More informationVXLAN Overview: Cisco Nexus 9000 Series Switches
White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationCommunication Networks Simulation of Communication Networks
Communication Networks Simulation of Communication Networks Silvia Krug 01.02.2016 Contents 1 Motivation 2 Definition 3 Simulation Environments 4 Simulation 5 Tool Examples Motivation So far: Different
More informationOn the Relationship of Server Disk Workloads and Client File Requests
On the Relationship of Server Workloads and Client File Requests John R. Heath Department of Computer Science University of Southern Maine Portland, Maine 43 Stephen A.R. Houser University Computing Technologies
More informationNetwork Layer Mobility: an Architecture and Survey. Yorktown Heights, NY College Park, MD 20742
Network Layer Mobility: an Architecture and Survey Pravin Bhagwat y Charles Perkins y Satish Tripathi z 1 Introduction y IBM, T.J. Watson Research Center z Computer Science Department P.O. Box 704 University
More informationIntelligent Optimization Methods for High-Dimensional Data Classification for Support Vector Machines
Intelligent Inormation Management, 200, 2, ***-*** doi:0.4236/iim.200.26043 Published Online June 200 (http://www.scirp.org/journal/iim) Intelligent Optimization Methods or High-Dimensional Data Classiication
More informationAutomatic Video Segmentation for Czech TV Broadcast Transcription
Automatic Video Segmentation or Czech TV Broadcast Transcription Jose Chaloupka Laboratory o Computer Speech Processing, Institute o Inormation Technology and Electronics Technical University o Liberec
More informationLecture (02) Network Protocols and Standards
Lecture (02) Network Protocols and Standards Dr. Ahmed M. ElShafee 1 Agenda - - 2 Preface Protocols and standards are what make networks work together. Protocols make it possible for the various components
More informationFPGA PLB EVALUATION USING QUANTIFIED BOOLEAN SATISFIABILITY
FPGA PLB EVALUATION USING QUANTIFIED BOOLEAN SATISFIABILITY Andrew C. Ling Electrical and Computer Engineering University o Toronto Toronto, CANADA email: aling@eecg.toronto.edu Deshanand P. Singh, Stephen
More informationGrowth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.
Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,
More informationSection II. Nios II Software Development
Section II. Nios II Sotware Development This section o the Embedded Design Handbook describes how to most eectively use the Altera tools or embedded system sotware development, and recommends design styles
More informationSurvey of the State of P2P File Sharing Applications
Survey of the State of P2P File Sharing Applications Keita Ooi, Satoshi Kamei, and Tatsuya Mori Abstract Recent improvements in Internet access have been accompanied by a dramatic spread of peer-to-peer
More informationA Proposed Approach for Solving Rough Bi-Level. Programming Problems by Genetic Algorithm
Int J Contemp Math Sciences, Vol 6, 0, no 0, 45 465 A Proposed Approach or Solving Rough Bi-Level Programming Problems by Genetic Algorithm M S Osman Department o Basic Science, Higher Technological Institute
More information3.2 COMMUNICATION AND INTERNET TECHNOLOGIES
3.2 COMMUNICATION AND INTERNET TECHNOLOGIES 3.2.1 PROTOCOLS PROTOCOL Protocol a set of rules governing the way that devices communicate with each other. With networks and the Internet, we need to allow
More informationTechnical Report. A Tighter Real-Time Communication Analysis for Wormhole-Switched Priority-Preemptive NoCs
Technical Report A Tighter Real-Time Communication Analysis or Wormhole-Switched Priority-Preemptive NoCs Borislav Nikolic Leandro Soares Indrusiak Stean M. Petters CISTER-TR-17111 Technical Report CISTER-TR-17111
More informationNfsight Ne*low- based Network Awareness Tool
LISA 10 Nov 7-12, 2010 San Jose, CA Nfsight Ne*low- based Network Awareness Tool Robin Berthier (University of Illinois at Urbana- Champaign) Michel Cukier (University of Maryland) Ma3 Hiltunen (AT&T Research)
More informationOn the Stability of the Information Carried by Traffic Flow Features at the Packet Level
On the Stability of the Information Carried by Traffic Flow Features at the Packet Level Alice Este, Francesco Gringoli, Luca Salgarelli DEA, Università degli Studi di Brescia, Italy Email: @ing.unibs.it
More informationEnhancing Bandwidth Utilization and QoS in Optical Burst Switched High-Speed Network
91 Enhancing Bandwidth Utilization and QoS in Optical Burst Switched High-Speed Network Amit Kumar Garg and R S Kaler School of Electronics and Communication Eng, Shri Mata Vaishno Devi University (J&K),
More informationShortest-hop Based Reliable Network Multicast
Shortest-hop Based Reliable Network Multicast K.L. Eddie Law, Daniel Siu Ryerson University, Toronto, Canada. Email: eddie@ee.ryerson.ca IBM Canada, Toronto, Canada. Email: siud@sympatico.ca Absact Although
More informationPower of Slicing in Internet Flow Measurement. Ramana Rao Kompella Cristian Estan
Power of Slicing in Internet Flow Measurement Ramana Rao Kompella Cristian Estan 1 IP Network Management Network Operator What is happening in my network? How much traffic flows towards a given destination?
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationDifferentiating Link State Advertizements to Optimize Control Overhead in Overlay Networks
Differentiating Link State Advertizements to Optimize Control Overhead in Overlay Networks Mathieu Bouet, Julien Boite, Jérémie Leguay and Vania Conan Thales Communications & Security, Paris, France Abstract
More informationMethod estimating reflection coefficients of adaptive lattice filter and its application to system identification
Acoust. Sci. & Tech. 28, 2 (27) PAPER #27 The Acoustical Society o Japan Method estimating relection coeicients o adaptive lattice ilter and its application to system identiication Kensaku Fujii 1;, Masaaki
More informationPerformance Consequences of Partial RED Deployment
Performance Consequences of Partial RED Deployment Brian Bowers and Nathan C. Burnett CS740 - Advanced Networks University of Wisconsin - Madison ABSTRACT The Internet is slowly adopting routers utilizing
More information9. Reviewing Printed Circuit Board Schematics with the Quartus II Software
November 2012 QII52019-12.1.0 9. Reviewing Printed Circuit Board Schematics with the Quartus II Sotware QII52019-12.1.0 This chapter provides guidelines or reviewing printed circuit board (PCB) schematics
More informationA Resource Allocation Controller for Cloud-based Adaptive Video Streaming
A Resource Allocation Controller or Cloud-based Adaptive Video Streaming Luca De Cicco, Saverio Mascolo, and Dario Calamita Abstract Video streaming accounts today or more than hal o the global Internet
More informationJoint Congestion Control and Scheduling in Wireless Networks with Network Coding
Title Joint Congestion Control and Scheduling in Wireless Networks with Network Coding Authors Hou, R; Wong Lui, KS; Li, J Citation IEEE Transactions on Vehicular Technology, 2014, v. 63 n. 7, p. 3304-3317
More informationImproved Simultaneous Localization and Mapping using a Dual Representation of the Environment
Improved Simultaneous Localization and Mapping using a Dual Representation o the Environment Kai M. Wurm Cyrill Stachniss Giorgio Grisetti Wolram Burgard University o Freiburg, Dept. o Computer Science,
More informationOn characterizing BGP routing table growth
University of Massachusetts Amherst From the SelectedWorks of Lixin Gao 00 On characterizing BGP routing table growth T Bu LX Gao D Towsley Available at: https://works.bepress.com/lixin_gao/66/ On Characterizing
More informationStudy and Analysis of Edge Detection and Implementation of Fuzzy Set. Theory Based Edge Detection Technique in Digital Images
Study and Analysis o Edge Detection and Implementation o Fuzzy Set Theory Based Edge Detection Technique in Digital Images Anju K S Assistant Proessor, Department o Computer Science Baselios Mathews II
More informationA Fault Model Centered Modeling Framework for Self-healing Computing Systems
A Fault Model Centered Modeling Framework or Sel-healing Computing Systems Wei Lu 1, Yian Zhu 1, Chunyan Ma 1, and Longmei Zhang 2 1 Department o Sotware and Microelectronics, Northwestern Polytechnical
More informationPeer Assisted Content Distribution over Router Assisted Overlay Multicast
Peer Assisted Content Distribution over Router Assisted Overlay Multicast George Xylomenos, Konstantinos Katsaros and Vasileios P. Kemerlis Mobile Multimedia Laboratory & Department of Informatics Athens
More information2. Getting Started with the Graphical User Interface
February 2011 NII52017-10.1.0 2. Getting Started with the Graphical User Interace NII52017-10.1.0 The Nios II Sotware Build Tools (SBT) or Eclipse is a set o plugins based on the popular Eclipse ramework
More informationMATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM
UDC 681.3.06 MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM V.K. Pogrebnoy TPU Institute «Cybernetic centre» E-mail: vk@ad.cctpu.edu.ru Matrix algorithm o solving graph cutting problem has been suggested.
More informationMining-based File Caching in a Hybrid Storage System
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING XX, XXX-XXX (2013) Mining-based File Caching in a Hybrid Storage System Hanyang University 222 Wangsimni-ro, Seongdong-gu, Seoul, Korea E-mail:{insight; yjwon}@hanyang.ac.kr,
More information