Characterizing the network behavior of P2P traffic

Size: px
Start display at page:

Download "Characterizing the network behavior of P2P traffic"

Transcription

1 Characterizing the network behavior o PP traic Raaele Bolla, Marco Canini, Riccardo Rapuzzi, Michele Sciuto DIST - Department o Communication, Computer and System Sciences, University o Genoa Via Opera Pia 3, 5 Genova, ITALY {raaele.bolla, marco.canini, riccardo.rapuzzi, michele.sciuto}@unige.it Abstract Nowadays the majority o Internet traic is generated by peer-to-peer (PP) ile sharing applications. As the popularity o these applications has been increasing dramatically over the past ew years, it becomes increasingly important to analyze their behavior and to understand their eects on the network. The ability to quantiy their impact on the network is undamental to a number o network operations, including traic engineering, capacity planning, quality o service, orecasting or long-term provisioning, etc. We present here a measurement study on the characteristics o the traic associated with two dierent PP applications. Our aim is to provide useul insight into the nature o PP traic rom the point o view o the network. To achieve this, we introduce a novel meauserement, Content Transer Index (), to distinguish two classes o behavior associated with PP traic: the download and the signaling traic proile. Next we apply the to our data sets and show that it eectively oers a general characterization o PP traic. Finally, we present a number o statistical measurements that are signiicantly unbiased due to having considered the distinction between the two classes. To the best o our knowledge, this is the irst study to ollow this approach. We believe such a study will help researchers better understand the impact o PP applications on the network and how to improve their perormance. I. INTRODUON Nowadays peer-to-peer (PP) ile sharing applications constitute a major share o the total traic in the Internet []. PP traic is believed to be hazardous or networks, not only because o its high traic volume, but also the transer o large iles. As the popularity o these applications has been increasing dramatically over the past ew years, it becomes important to analyze their behavior and understand their eects on the network. In particular, quantiying their impact on the network is important to a broad range o network operations, including traic engineering, capacity planning, quality o service, orecasting or long-term provisioning, etc. Recent works ([], [3] and []) have shown that accurate identiication o PP traic is challenging because PP applications, particularling the newer generations are incorporating various strategies to avoid detection. The ability to identiy PP traic is undamental to quantiy the impact o PP applications. However, it only represents a irst step towards ully understanding their behavior and eects on the network. We present here a measurement study on the characteristics o the traic associated with two dierent PP applications. Our aim is to oer useul insight into the nature o PP traic as it is seen rom the point o view o the network. To achieve this, we introduce a novel measurement, Content Transer Index (), that distinguishes two classes o behavior or the PP traic: the download and the signaling traic proile. We applied the to our data sets and we show that it eectively oers a general characterization o PP traic by presenting a number o statistical measurements. Our results show that the download traic is, as expected, the majority o the total traic volume. However, because o the large number o signaling communications, simple statistical measurements applied to the entire traic aggregate are biased as they ail to capture the real behavior o PP traic. Because o the large dierences between these two types o traic, we argue that a comprehensive PP traic characterization should include this distinction. As a preliminary validation, we compared the s outcome, speciically the edonkey downloads, against the ground truth built using the methodology presented in [5], resulting in an accuracy o above 95%. The remainder o this paper is organized as ollows. Section II describes how we identiied PP traic in our data sets. Section III gives a brie overview o the edonkey and BitTorrent PP networks. Section IV presents our characterization o PP traic, and the results o its application to a number o measurements are shown in Section V. Finally, Section VI concludes the paper. II. DATA COLLEON We analyzed traces that were collected using an optimized Linux-based open router [] turned into a monitoring box. The monitor was located at two dierent links o the University s campus network. For both traces, we captured every packet seen on each direction o the links along with its ull payload and we removed the link layer header (ethernet). To capture the irst trace (DEPT), the monitor was located on the link connecting our department to the campus network. The second trace (GENUA) was captured by monitoring the main connection to the Internet. Being a data set that spans over two weeks, the DEPT trace is our reerence trace, whereas GENUA is used to conirm our indings. We post-processed the trace in order to exclude the TCP connections or which we do not observe the canonical set up (triple handshake). Table I lists general workload dimensions o our data sets: counts o distinct source and destination IP addresses, and the number o lows, packets, and bytes observed. The optimizations include using the Linux NAPI s polling mode and tuning the network card s RX ring buer and the OS s socket buers.

2 TABLE I GENERAL WORKLOAD DIMENSIONS OF OUR TRACES. Set Dur. Src. IP Dst. IP Flows Packets Bytes DEPT 9h.8M 5.9M M M 738GB GENUA h K 53K 97K M.5GB In this study we deine lows as unidirectional, while we use the term conversation to denote bidirectional traic, i.e., a conversation is composed by two lows: traic rom A to B, and traic rom B to A. Each low is always identiied by two end points consisting o {IP, port} pairs and the transport level protocol. For a protocol like UDP, which is not connection oriented, we use a timeout o s to determine the end o a conversation. We used two open source tools, namely l7-ilter [7] and ippp [8], to classiy the PP traic in our traces. Both these tools identiy PP lows via pattern matching, i.e., searching the payload content o the packets or known protocol signatures. These classiiers act every time a packet is received, and mark a conversation as classiied as soon as they ind a known pattern in one direction. For scalability reasons, only up to the irst N packets o each conversation are tested, where N is a user conigurable parameter. These tools dier in the way the pattern matching is realized: l7-ilter reassembles the packet payloads into a buer (there is one buer or each direction), stripping the null bytes, and uses regular expressions to search the buer or strings containing a match to a known protocol signature; ippp searches each individual packet or known patterns o the most common PP protocols. Many o the signatures used by l7-ilter and ippp are obtained rom protocol speciications. However, because this is not generally possible or proprietary protocols, they are in some cases derived rom reverse engineering the protocols, like what has been done by the authors o []. Because these tools are not available as o-line trace processing tools (they are originally meant to be deployed as ilters in the Linux s iptables irewall or traic shaping purposes), we ported their source code to the Click modular router [9], which turned out to be a viable analysis ramework. We validated our versions o the tools against the original tools by comparing the results obtained rom the classiication o the GENUA data set. The outputs were indeed the same. We exploited both these tools to accurately identiy PP traic in our data sets. As done in [3], we limited to the number o packets per low searched or signatures. By running the tools on our traces, we ound that the dierences in their classiication results were negligible, thereore we only used ippp. Finally, we compared the classiication results obtained with our ippp classiier with the output o the payload classiier used to validate BLINC [], obtaining very close results on our data sets. Table II presents the volumes o PP traic in our traces, divided by PP application. In the remainder o the paper we only ocus on the traic TABLE II BREAKDOWN BY PROTOCOL OF PP TRAFFIC VOLUME IN OUR TRACES. PP Protocol GENUA DEPT BitTorrent 9.7%.9% edonkey 7.33% 73.55% Gnutella.78%.% KaZaA.%.% DirectConnect 7.%.% WinMX.%.% generated by edonkey and BitTorrent, since the majority o PP traic in our campus network is associated with these two applications. III. EDONKEY AND BITTORRENT OVERVIEW In this section we briely present the main eatures o edonkey and BitTorrent. edonkey: The edonkey network belongs to the class o hybrid PP architecture: it is composed o peers and multiple servers. The servers provide a ile search service and maintain a list o addresses o other servers, to be distributed to peers. Each peer logs on to one o the servers (using a TCP connection) and registers its shared iles with it. To search a ile, a peer sends the query to its main server which replies with a list o matching iles and their location. Optionally, the peer can send urther queries directly to other servers via UDP. To download a ile, a peer establishes direct TCP connections to the peers that are sharing the requested ile. During download, iles are split into separate pieces. Pieces o the same ile can be obtained rom several dierent peers. Finally, a ile can be shared by a peer beore it is completely downloaded. BitTorrent: BitTorrent is a ile distribution system based on the PP paradigm. Unlike other popular PP networks, such as edonkey or Gnutella, which comes with a ile search service, the sole objective o BitTorrent is to quickly replicate a single large ile to a set o clients. There is a separate torrent or each ile that is distributed. A torrent consists o a central component, called a tracker and all the currently active peers. The role o the tracker is to act as a rendez-vous point or the peers o the torrent, however it is not involved in the actual distribution o the iles. Once a peer joins a torrent, it irst contacts the tracker to retrieve a list o active peers. It then cooperates with - peers chosen at random to replicate the ile among each other. Although there are unoicial extensions to support UDP communications, by deault, BitTorrent only uses TCP. IV. PP TRAFFIC CHARACTERIZATION PP traic can be roughly divided into download traic and signaling traic: the irst is caused by the transer o content, PP traic is believed to be hazardous or networks, and our campus network makes no exception. We are aware that a iltering system has been deployed, realizing traic shaping or the most common PP applications.

3 the latter is mainly due to the presence o an overlay network, and possibly a search service. Because o the large dierences between these two types o traic, we argue that a comprehensive PP traic characterization should include this distinction. In act, even though the download traic is generally the major share o the total PP traic volume, i such distinction is not taken into account, then, because o the large number o signaling conversations, simple statistical measurements are biased. A way to accurately dierentiate download vs. signaling traic would be to implement a protocol analyzer. Although one can leverage existing tools, e.g. binpac [], to build protocol analyzers, this solution has several drawbacks: (i) it requires speciic knowledge o PP protocols, (ii) it needs access to the payload o each packet, (iii) it has to maintain a state or each conversation. In particular, we are interested in characterizing the PP traic rom the point o view o the network, i.e., to gain more insight on the distinctive characteristics o the behavior o aggregates o download and signaling PP conversations, including the volumes o carried content, the conversations interarrival times and durations. We point out that it is not our intention to provide a method that deterministically divide PP conversations into the two categories. Thus, we ollow a novel approach that doesn t rely on the accuracy o the solution based on protocol analyzers, but provides a means or clearly distinguishing two dierent classes o behaviors and or treating PP traic with generality. We call such classes o behaviors the download and the signaling traic proiles. To some extents we re abusing this terminology, as it is possible, though not common, that a download conversation exhibits the typical characteristics o signaling traic and vice-versa. For example, early truncated downloads are not clearly distinguishable rom signaling conversations. However, we accept such misclassiications because misclassiied lows don t bias our measurements and we want to keep our method simple. Our approach consists o a way to oer a statistical characterization o PP traic through the ormalization o a measurement index. We now deine the Content Transer Index (CT I) o a conversation C as: F + F P MSS(C) + + F p [, ], MSS(C) where F, are the lengths o the two lows constituting C, such that F. One can use three dierent low eatures to represent its length: the packet count, the count o payload bytes and the count o headers and payload bytes. However, in this paper, we only present the results obtained by using the count o payload bytes as the low length. P and p represent the average number o payload bytes per packet calculated or the low with length F and respectively. The maximum segment size (MSS) o the conversation C is expressed with MSS(C). For the UDP, we assume that the MSS corresponds to the maximum transer unit (MTU) minus the IP and UDP headers lengths. Hence, given the pair o end points {A, B}, the gives us a measure o the way the content is transerred. At the opposite ends o the spectrum there are two distinct traic proiles: when the conversation is latter or balanced (i.e., A and B exchange an even quantity o content, mainly using packets whose payload size is ar rom the MSS), then the s value tends to zero; when the conversation is richer o content which is either transerred rom a single end point that dominates the conversation (unbalanced), or eiciently exchanged between the end points, then the s value tends to one. The intuition behind the proposed metric derives rom observing that the traic proiles o download and signaling conversations are quite dierent. The idea is that, during a ile download, a peer, on average, gets packets illed up to the MTU and sends back ewer packets to acknowledge the received data. Even when the peers are exchanging pieces o a single ile with one another (as realized in BitTorrent), causing balanced conversations, still, the average payload size tends to reach the MSS. On the contrary, the signaling conversations are characterized by a latter proile, consisting o a more even count o exchanged bytes and packets. Throughout the rest o the paper, we divide PP traic into signaling vs. download by using the value o the conversation s. In particular we use a threshold to distinguish the two traic types: a conversation with a s value above the threshold is marked as download, while a value below the threshold determines a signaling conversation. To validate our metric, we classiy edonkey conversations in our DEPT data set into download and non-download. A conversation is marked to belong to the download category i the conversation contains at least one o the edonkey protocol opcodes OP SENDINGPART or OP COMPRESSEDPART. We computed the accuracy as the number o correctly classiied download conversations over the total count o conversations. We ound that using. as the threshold, we correctly classiy 95% o the download conversations (i.e., 95% o the download conversations have greater than.). The value. appears to the common break point to the graphs in Figure and we choose to use it in the rest o the paper. The limit o this validation is that we are unable to accurately identiy signaling conversations rom the ones classiied as non-download, because some download conversations might end up being in the non-download category. However, we obtain that only the.5% o non-download conversations have s value above the threshold and that there is a dierence o one order o magnitude between the average packet size, volume and duration o the non-download conversations above the threshold and those below it.

4 [%] 5 3 F [%] 5 3 F (a) edonkey - DEPT (b) edonkey - GENUA 35 3 F F+ [%] [%] (c) BitTorrent - DEPT (d) BitTorrent - GENUA Fig.. Relationships between the conversations, payload bytes and the o (a) edonkey conversations in DEPT, (b) edonkey conversations in GENUA, (c) BitTorrent conversations in DEPT and (d) BitTorrent conversations in GENUA. The histograms are plotted with bin size.. A. graphs V. PP TRAFFIC ANALYZES Figure a, b, c and d show the relationships between the conversations, payload bytes and the o DEPT s edonkey, GENUA s edonkey, DEPT s BitTorrent and GENUA s BitTorrent TCP conversations respectively. Each igure shows three overlapping histograms, symbolizing the ollowing igures corresponding to the same range: the number o conversations, the summation o the minimum and maximum length lows o the conversations (denoted with F + ) and the summation o just the minimum length lows (denoted with ). All the graphs clearly show two distinctive proiles: the signaling proile containing most o the conversations is having values below., whereas the download proile dominated by the payload bytes above.. Also note in the signaling proiles that the conversations are quite balanced ( is almost F). B. Interarrival times Table III lists the average, standard deviation and maximum conversation interarrival times. TABLE III AVERAGE, STANDARD DEVIATION AND MAXIMUM CONVERSATION INTERARRIVAL TIMES [S] IN DEPT. Conversation Avg. Std. dev. Max edonkey sign edonkey down BitTorrent sign BitTorrent down The CDFs o both the edonkey and BitTorrent conversation interarrival times reveal an exponential decay, as shown in Figure. There is again a signiicant dierence or signaling and download conversations since downloads happen rarely. Note that the graphs or DEPT and GENUA are comparable even though they are two dierent points o aggregation. C. Durations Table IV lists the average, standard deviation and maximum conversation durations. The CDFs o both the edonkey and BitTorrent conversation durations, shown in Figure 3, reveal some interesting inorma-

5 CDF Arrival time [s] Fig.. (a) DEPT CDF Arrival time [s] (b) GENUA CDF o the observed edonkey and BitTorrent conversation interarrival times. CDF Duration [s] (a) DEPT Fig. 3. CDF Duration [s] (b) GENUA CDF o the observed edonkey and BitTorrent conversation durations. TABLE IV AVERAGE, STANDARD DEVIATION AND MAXIMUM CONVERSATION DURATIONS [S] IN DEPT. Conversation Avg. Std. dev. Max edonkey sign edonkey down BitTorrent sign BitTorrent down tion. First o all, the curves o the download conversations are very similar or both the protocols and both the traces. This is primarily due to the s capability to distinguish the nature o a conversation, regardless o the speciic PP protocol. The edonkey signaling conversation durations appear to be concentrated in a small range o values, while the BitTorrent one is distributed in a larger range o small values. VI. CONCLUSION AND FUTURE WORK In this paper we have presented a characterization o PP traic. We have introduced a new measurement, the, that can be used to distinguish two classes o behavior or the PP traic: the download and the signaling traic proile. We applied the to the edonkey and BitTorrent conversations in our data sets and we showed that it eectively oers a general characterization o PP traic. Finally, we presented a number o statistical measurements that are signiicantly unbiased because o the distinction in those two proile classes. In the uture, we want to extend the ormula to depend on the count o packets in the conversation in order to deal with small unbalanced conversations that would be classiied as download but are most likely going to be signaling. We re also interested to extend this work to dierent types o PP applications and apply the to dierent content such as audio and video. In a next step, we will deine a model based on the presented measures that can be used to generate PP traic aggregates. We ll also consider the possibility to build a PP traic classiier based on the temporal evolution o the. ACKNOWLEDGMENT This work was supported by the project INTERMEDIA NoE, in the rame o the EU IST FP Program, by MIUR- PRIN project FAMOUS Fluid Analytical Models O autonomic Systems and by MIUR-PRIN project RECIPE Robust and Eicient traic Classiication in IP networks. We also would like to thank CSITA or helping us during the work. REFERENCES [] S. Sen and J. Wang, Analyzing peer-to-peer traic across large networks, in Second Annual ACM Internet Measurement Workshop, Nov.. [] T. Karagiannis, A. Broido, N. Brownlee, kc clay, and M. Faloutsos, Is PP dying or just hiding? in IEEE GLOBECOM,. [3] S. Sen, O. Spatscheck, and D. Wang, Accurate, scalable in-network identiication o PP traic using application signatures, in Proceedings o the 3th international conerence on World Wide Web, May.

6 [] T. Karagiannis, K. Papagiannaki, and M. Faloutsos, BLINC: Multilevel traic classiication in the dark, in Proceedings o ACM Sigcomm, Aug. 5. [5] K. Tutschku, A measurement-based traic proile o the edonkey ilesharing service, in Proceedings o PAM, Apr.. [] R. Bolla and R. Bruschi, RFC 5 perormance evaluation and internal measurements or a Linux based open router, in Proceedings o IEEE Workshop on High Perormance Switching and Routing, Jun.. [7] l7-ilter, [8] IPPP, [9] E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek, The click modular router, ACM Transactions on Computer Systems, vol. 8, no. 3, pp. 3 97, Aug.. [] R. Pang, V. Paxson, R. Sommer, and L. Peterson, binpac: A yacc or writing application protocol parsers, in Proceedings o ACM Sigcomm Internet Measurement Conerence, Oct..

On the Double-Faced Nature of P2P Traffic

On the Double-Faced Nature of P2P Traffic On the Double-Faced Nature o P2P Traic Raaele Bolla, Marco Canini, Riccardo Rapuzzi, Michele Sciuto DIST - Department o Communication, Computer and System Sciences, University o Genoa Via Opera Pia 13,

More information

Monitoring and Classification of Teletraffic in P2P Environment

Monitoring and Classification of Teletraffic in P2P Environment Monitoring and Classification of Teletraffic in P2P Environment Raffaele Bolla, Riccardo Rapuzzi, Michele Sciuto DIST - Department of Communication, Computer and System Sciences University of Genoa Via

More information

A Method of Identifying the P2P File Sharing

A Method of Identifying the P2P File Sharing IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications

More information

First Video Streaming Experiments on a Time Driven Priority Network

First Video Streaming Experiments on a Time Driven Priority Network First Video Streaming Experiments on a Driven Priority Network Mario Baldi and Guido Marchetto Department o Control and Computer Engineering Politecnico di Torino (Technical University o Torino) Abstract

More information

TO meet the increasing bandwidth demands and reduce

TO meet the increasing bandwidth demands and reduce Assembling TCP/IP Packets in Optical Burst Switched Networks Xiaojun Cao Jikai Li Yang Chen Chunming Qiao Department o Computer Science and Engineering State University o New York at Bualo Bualo, NY -

More information

BotCop: An Online Botnet Traffic Classifier

BotCop: An Online Botnet Traffic Classifier 2009 Seventh Annual Communications Networks and Services Research Conerence BotCop: An Online Botnet Traic Classiier Wei Lu, Mahbod Tavallaee, Goaletsa Rammidi and Ali A. Ghorbani Faculty o Computer Science

More information

BLINC: Multilevel Traffic Classification in the Dark

BLINC: Multilevel Traffic Classification in the Dark BLINC: Multilevel Traffic Classification in the Dark Thomas Karagiannis, UC Riverside Konstantina Papagiannaki, Intel Research Cambridge Michalis Faloutsos, UC Riverside The problem of workload characterization

More information

Automated Modelization of Dynamic Systems

Automated Modelization of Dynamic Systems Automated Modelization o Dynamic Systems Ivan Perl, Aleksandr Penskoi ITMO University Saint-Petersburg, Russia ivan.perl, aleksandr.penskoi@corp.imo.ru Abstract Nowadays, dierent kinds o modelling settled

More information

Classification Method for Colored Natural Textures Using Gabor Filtering

Classification Method for Colored Natural Textures Using Gabor Filtering Classiication Method or Colored Natural Textures Using Gabor Filtering Leena Lepistö 1, Iivari Kunttu 1, Jorma Autio 2, and Ari Visa 1, 1 Tampere University o Technology Institute o Signal Processing P.

More information

CSE3213 Computer Network I

CSE3213 Computer Network I SE33 omputer Network I Service Model, Error ontrol, Flow ontrol, and Link Sharing (h. 5. 5.3. and 5.7.) ourse page: http://www.cse.yorku.ca/course/33 Slides modiied om lberto Leon-Garcia and Indra Widjaja

More information

A Hybrid Approach for Accurate Application Traffic Identification

A Hybrid Approach for Accurate Application Traffic Identification A Hybrid Approach for Accurate Application Traffic Identification Thesis Defence December 21, 2005 Young J. Won yjwon@postech.ac.kr Distributed Processing & Network Management Lab. Dept. of Computer Science

More information

ITU - Telecommunication Standardization Sector. G.fast: Far-end crosstalk in twisted pair cabling; measurements and modelling ABSTRACT

ITU - Telecommunication Standardization Sector. G.fast: Far-end crosstalk in twisted pair cabling; measurements and modelling ABSTRACT ITU - Telecommunication Standardization Sector STUDY GROUP 15 Temporary Document 11RV-22 Original: English Richmond, VA. - 3-1 Nov. 211 Question: 4/15 SOURCE 1 : TNO TITLE: G.ast: Far-end crosstalk in

More information

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Timothy Glennan, Christopher Leckie, Sarah M. Erfani Department of Computing and Information Systems,

More information

Neighbourhood Operations

Neighbourhood Operations Neighbourhood Operations Neighbourhood operations simply operate on a larger neighbourhood o piels than point operations Origin Neighbourhoods are mostly a rectangle around a central piel Any size rectangle

More information

Overview. Introduction. Internet Worm. Defenses. Recent Trends. Detection and Propagation Modeling of Internet Worms

Overview. Introduction. Internet Worm. Defenses. Recent Trends. Detection and Propagation Modeling of Internet Worms Overview Detection and Propagation Modeling o Internet Worms Ph.D. research proposal by: Parbati Kumar Manna Co-advised by: Dr. Sanjay Ranka and Dr. Shigang Chen Research opportunities in Internet worm

More information

FRM: An Alternative Approach to Accurate Application Traffic Identification

FRM: An Alternative Approach to Accurate Application Traffic Identification FRM: An Alternative Approach to Accurate Application Traffic Identification Young J. Won 1, Myung-Sup Kim 2, James W. Hong 1 1 Dept. of Computer Science and Engineering, POSTECH {yjwon, jwkhong}@postech.ac.kr

More information

Applying fair queueing and traffic shaping for Internet applications on top of ATM The LB_SCFQ algorithm

Applying fair queueing and traffic shaping for Internet applications on top of ATM The LB_SCFQ algorithm Applying air queueing and traic shaping or Internet applications on top o ATM The LB_SCFQ algorithm Abstract Fair queueing mechanisms give very promising results or ATM networks. Combining a air queueing

More information

A Classification System and Analysis for Aspect-Oriented Programs

A Classification System and Analysis for Aspect-Oriented Programs A Classiication System and Analysis or Aspect-Oriented Programs Martin Rinard, Alexandru Sălcianu, and Suhabe Bugrara Massachusetts Institute o Technology Cambridge, MA 02139 ABSTRACT We present a new

More information

Can we trust the inter-packet time for traffic classification?

Can we trust the inter-packet time for traffic classification? Can we trust the inter-packet time for traffic classification? Mohamad Jaber, Roberto G. Cascella and Chadi Barakat INRIA Sophia Antipolis, EPI Planète 2004, Route des Luciolles Sophia Antipolis, France

More information

Bittorrent traffic classification

Bittorrent traffic classification Bittorrent traffic classification Tung M Le 1, Jason But Centre for Advanced Internet Architectures. Technical Report 091022A Swinburne University of Technology Melbourne, Australia jbut@swin.edu.au Abstract-

More information

ROBUST FACE DETECTION UNDER CHALLENGES OF ROTATION, POSE AND OCCLUSION

ROBUST FACE DETECTION UNDER CHALLENGES OF ROTATION, POSE AND OCCLUSION ROBUST FACE DETECTION UNDER CHALLENGES OF ROTATION, POSE AND OCCLUSION Phuong-Trinh Pham-Ngoc, Quang-Linh Huynh Department o Biomedical Engineering, Faculty o Applied Science, Hochiminh University o Technology,

More information

Classifier Evasion: Models and Open Problems

Classifier Evasion: Models and Open Problems Classiier Evasion: Models and Open Problems Blaine Nelson 1, Benjamin I. P. Rubinstein 2, Ling Huang 3, Anthony D. Joseph 1,3, and J. D. Tygar 1 1 UC Berkeley 2 Microsot Research 3 Intel Labs Berkeley

More information

Game Traffic Analysis: An MMORPG Perspective

Game Traffic Analysis: An MMORPG Perspective Appeared in ACM NOSSDAV 2005 (15th International Workshop on Network and Operating System Support for Digital Audio and Video) Game Traffic Analysis: An MMORPG Perspective (MMORPG: Massive Multiplayer

More information

CPSC 641: WAN Measurement. Carey Williamson Department of Computer Science University of Calgary

CPSC 641: WAN Measurement. Carey Williamson Department of Computer Science University of Calgary CPSC 641: WAN Measurement Carey Williamson Department of Computer Science University of Calgary WAN Traffic Measurements There have been several studies of wide area network traffic (i.e., Internet traffic)

More information

CS4/MSc Computer Networking. Lectures 4-5 Transport layer protocols TCP/UDP automatic repeat request

CS4/MSc Computer Networking. Lectures 4-5 Transport layer protocols TCP/UDP automatic repeat request S4/MSc omputer Networking Lectures 4-5 Transport layer protocols TP/UDP automatic repeat request omputer Networking, opyright University o Edinburgh 005 Transport services and protocols provide logical

More information

An MMPP-Based Hierarchical Model of Internet Traffic

An MMPP-Based Hierarchical Model of Internet Traffic An MMPP-Based Hierarchical o Internet Traic L.Muscariello, M.Mellia, M.Meo, M.Ajmone Marsan Dipartimento di Elettronica, Politecnico di Torino, Italy R. Lo Cigno Dipartimento di Inormatica e Telecomunicazioni,

More information

A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy

A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy Journal o Inormation Security, 2012, 3, 18-24 http://dx.doi.org/10.4236/jis.2012.31003 Published Online January 2012 (http://www.scirp.org/journal/jis) A Multi-Stage Network Anomaly Detection Method or

More information

Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation

Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation Selim Ciraci, Ibrahim Korpeoglu, and Özgür Ulusoy Department of Computer Engineering, Bilkent University, TR-06800 Ankara,

More information

Decision Support Systems for E-Purchasing using Case-Based Reasoning and Rating Based Collaborative Filtering

Decision Support Systems for E-Purchasing using Case-Based Reasoning and Rating Based Collaborative Filtering Decision Support Systems or E-Purchasing using Case-Based Reasoning and Rating Based Collaborative Filtering ABSTRACT The amount o trade conducted electronically has grown dramatically since the wide introduction

More information

TOWARDS HIGH-PERFORMANCE NETWORK APPLICATION IDENTIFICATION WITH AGGREGATE-FLOW CACHE

TOWARDS HIGH-PERFORMANCE NETWORK APPLICATION IDENTIFICATION WITH AGGREGATE-FLOW CACHE TOWARDS HIGH-PERFORMANCE NETWORK APPLICATION IDENTIFICATION WITH AGGREGATE-FLOW CACHE Fei He 1, 2, Fan Xiang 1, Yibo Xue 2,3 and Jun Li 2,3 1 Department of Automation, Tsinghua University, Beijing, China

More information

AN 608: HST Jitter and BER Estimator Tool for Stratix IV GX and GT Devices

AN 608: HST Jitter and BER Estimator Tool for Stratix IV GX and GT Devices AN 608: HST Jitter and BER Estimator Tool or Stratix IV GX and GT Devices July 2010 AN-608-1.0 The high-speed communication link design toolkit (HST) jitter and bit error rate (BER) estimator tool is a

More information

Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes

Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Zhili Zhao Dept. of Elec. Engg., 214 Zachry College Station, TX 77843-3128 A. L. Narasimha Reddy

More information

Identify P2P Traffic by Inspecting Data Transfer Behaviour

Identify P2P Traffic by Inspecting Data Transfer Behaviour Identify P2P Traffic by Inspecting Data Transfer Behaviour Mingjiang Ye, Jianping Wu,KeXu,DahMingChiu 2 Department of Computer Science, Tsinghua University, Beijing, 84, P.R.China yemingjiang@csnet.cs.tsinghua.edu.cn,

More information

Classifier Evasion: Models and Open Problems

Classifier Evasion: Models and Open Problems . In Privacy and Security Issues in Data Mining and Machine Learning, eds. C. Dimitrakakis, et al. Springer, July 2011, pp. 92-98. Classiier Evasion: Models and Open Problems Blaine Nelson 1, Benjamin

More information

Road Sign Analysis Using Multisensory Data

Road Sign Analysis Using Multisensory Data Road Sign Analysis Using Multisensory Data R.J. López-Sastre, S. Lauente-Arroyo, P. Gil-Jiménez, P. Siegmann, and S. Maldonado-Bascón University o Alcalá, Department o Signal Theory and Communications

More information

Empirical Models of TCP and UDP End User Network Traffic from Data Analysis

Empirical Models of TCP and UDP End User Network Traffic from Data Analysis Empirical Models of TCP and UDP End User Network Traffic from NETI@home Data Analysis Charles R. Simpson, Jr., Dheeraj Reddy, George F. Riley School of Electrical and Computer Engineering Georgia Institute

More information

Overlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen

Overlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen Overlay and P2P Networks Unstructured networks PhD. Samu Varjonen 25.1.2016 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find

More information

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 20.1.2014 Contents P2P index revisited Unstructured networks Gnutella Bloom filters BitTorrent Freenet Summary of unstructured networks

More information

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 19.1.2015 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find

More information

MAPI Computer Vision. Multiple View Geometry

MAPI Computer Vision. Multiple View Geometry MAPI Computer Vision Multiple View Geometry Geometry o Multiple Views 2- and 3- view geometry p p Kpˆ [ K R t]p Geometry o Multiple Views 2- and 3- view geometry Epipolar Geometry The epipolar geometry

More information

An Optimized Method for Analyzing the Peer to Peer Traffic

An Optimized Method for Analyzing the Peer to Peer Traffic European Journal of Scientific Research ISSN 1450-216X Vol.34 No.4 (2009), pp.535-541 EuroJournals Publishing, Inc. 2009 http://www.eurojournals.com/ejsr.htm An Optimized Method for Analyzing the Peer

More information

Tree-Based Minimization of TCAM Entries for Packet Classification

Tree-Based Minimization of TCAM Entries for Packet Classification Tree-Based Minimization of TCAM Entries for Packet Classification YanSunandMinSikKim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington 99164-2752, U.S.A.

More information

On Veracious Search In Unsystematic Networks

On Veracious Search In Unsystematic Networks On Veracious Search In Unsystematic Networks K.Thushara #1, P.Venkata Narayana#2 #1 Student Of M.Tech(S.E) And Department Of Computer Science And Engineering, # 2 Department Of Computer Science And Engineering,

More information

An Efficient Configuration Methodology for Time-Division Multiplexed Single Resources

An Efficient Configuration Methodology for Time-Division Multiplexed Single Resources An Eicient Coniguration Methodology or Time-Division Multiplexed Single Resources Benny Akesson 1, Anna Minaeva 1, Přemysl Šůcha 1, Andrew Nelson 2 and Zdeněk Hanzálek 1 1 Czech Technical University in

More information

THE FINANCIAL CALCULATOR

THE FINANCIAL CALCULATOR Starter Kit CHAPTER 3 Stalla Seminars THE FINANCIAL CALCULATOR In accordance with the AIMR calculator policy in eect at the time o this writing, CFA candidates are permitted to use one o two approved calculators

More information

Reduce the False Positive and False Negative from Real Traffic with Intrusion Detection

Reduce the False Positive and False Negative from Real Traffic with Intrusion Detection Research Inventy: International Journal Of Engineering And Science Vol.05, Issue 01 (January 2015), PP: 09-14 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.com Reduce the False Positive

More information

Visualization of Internet Traffic Features

Visualization of Internet Traffic Features Visualization of Internet Traffic Features Jiraporn Pongsiri, Mital Parikh, Miroslova Raspopovic and Kavitha Chandra Center for Advanced Computation and Telecommunications University of Massachusetts Lowell,

More information

SVILUPPO DI UNA TECNICA DI RICONOSCIMENTO STATISTICO DI APPLICAZIONI SU RETE IP

SVILUPPO DI UNA TECNICA DI RICONOSCIMENTO STATISTICO DI APPLICAZIONI SU RETE IP UNIVERSITÀ DEGLI STUDI DI PARMA FACOLTÀ di INGEGNERIA Corso di Laurea Specialistica in Ingegneria delle Telecomunicazioni SVILUPPO DI UNA TECNICA DI RICONOSCIMENTO STATISTICO DI APPLICAZIONI SU RETE IP

More information

The aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are

The aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are The aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are important requirements for developing programs that

More information

13. Power Optimization

13. Power Optimization 13. Power Optimization May 2013 QII52016-13.0.0 QII52016-13.0.0 The Quartus II sotware oers power-driven compilation to ully optimize device power consumption. Power-driven compilation ocuses on reducing

More information

Proportional-Share Scheduling for Distributed Storage Systems

Proportional-Share Scheduling for Distributed Storage Systems Proportional-Share Scheduling or Distributed Storage Systems Abstract Yin Wang University o Michigan yinw@eecs.umich.edu Fully distributed storage systems have gained popularity in the past ew years because

More information

A Large Scale Simulation Study: Impact of Unresponsive Malicious Flows

A Large Scale Simulation Study: Impact of Unresponsive Malicious Flows A Large Scale Simulation Study: Impact of Unresponsive Malicious Flows Yen-Hung Hu, Debra Tang, Hyeong-Ah Choi 3 Abstract Researches have unveiled that about % of current Internet traffic is contributed

More information

Profiling the End Host

Profiling the End Host Profiling the End Host Thomas Karagiannis 1, Konstantina Papagiannaki 2, Nina Taft 2, and Michalis Faloutsos 3 1 Microsoft Research 2 Intel Research 3 UC Riverside Abstract. Profiling is emerging as a

More information

A Fluid-Flow Characterization of Internet1 and Internet2 Traffic *

A Fluid-Flow Characterization of Internet1 and Internet2 Traffic * A Fluid-Flow Characterization of Internet1 and Internet2 Traffic * Joe Rogers and Kenneth J. Christensen Department of Computer Science and Engineering University of South Florida Tampa, Florida 33620

More information

Research Progress for the Interest Control Protocol of Content-centric Networking

Research Progress for the Interest Control Protocol of Content-centric Networking Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com Research Progress or the Interest Control Protocol o Content-centric Networing GAO QIANG, WANG WEIMING, ZHOU JINGJING Zhejiang Gongshang

More information

A Method of Sign Language Gesture Recognition Based on Contour Feature

A Method of Sign Language Gesture Recognition Based on Contour Feature Proceedings o the World Congress on Engineering and Computer Science 014 Vol I WCECS 014, -4 October, 014, San Francisco, USA A Method o Sign Language Gesture Recognition Based on Contour Feature Jingzhong

More information

A Requirement Specification Language for Configuration Dynamics of Multiagent Systems

A Requirement Specification Language for Configuration Dynamics of Multiagent Systems A Requirement Speciication Language or Coniguration Dynamics o Multiagent Systems Mehdi Dastani, Catholijn M. Jonker, Jan Treur* Vrije Universiteit Amsterdam, Department o Artiicial Intelligence, De Boelelaan

More information

A STUDY ON COEXISTENCE OF WLAN AND WPAN USING A PAN COORDINATOR WITH AN ARRAY ANTENNA

A STUDY ON COEXISTENCE OF WLAN AND WPAN USING A PAN COORDINATOR WITH AN ARRAY ANTENNA A STUDY ON COEXISTENCE OF WLAN AND WPAN USING A PAN COORDINATOR WITH AN ARRAY ANTENNA Yuta NAKAO(Graduate School o Engineering, Division o Physics, Electrical and Computer Engineering, Yokohama National

More information

Application Presence Fingerprinting for NAT-Aware Router

Application Presence Fingerprinting for NAT-Aware Router Application Presence Fingerprinting for NAT-Aware Router Jun Bi, Lei Zhao, and Miao Zhang Network Research Center, Tsinghua University Beijing, P.R. China, 100084 junbi@cernet.edu.cn Abstract. NAT-aware

More information

Abstract. I. Introduction

Abstract. I. Introduction 46th AIAA/ASME/ASCE/AHS/ASC Structures, Structural Dynamics & Materials Conerence 8 - April 005, Austin, Texas AIAA 005-83 M Intuitive Design Selection Using Visualized n-dimensional Pareto Frontier G.

More information

PERFORMANCE EVALUATION OF LAYER 4 SWITCHING IN IPv6 VERSUS IPv4

PERFORMANCE EVALUATION OF LAYER 4 SWITCHING IN IPv6 VERSUS IPv4 PERFORMANCE EVALUATION OF LAYER 4 SWITCHING IN IPv6 VERSUS IPv4 Daniel ZINCA, Virgil DOBROTA, Cristian Mihai VANCEA Technical University o Cluj-Napoca, Department o Communications, 26 Baritiu Street, 3400

More information

Analysis of WLAN Traffic in the Wild

Analysis of WLAN Traffic in the Wild Analysis of WLAN Traffic in the Wild Caleb Phillips and Suresh Singh Portland State University, 1900 SW 4th Avenue Portland, Oregon, 97201, USA {calebp,singh}@cs.pdx.edu Abstract. In this paper, we analyze

More information

Early Application Identification

Early Application Identification Early Application Identification Laurent Bernaille Renata Teixeira Kave Salamatian Université Pierre et Marie Curie - LIP6/CNRS Which applications run on my network? Internet Edge Network (campus, enterprise)

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent

More information

ENSC 427 SPRING 2011 FINAL PROJECT EXPLORING TRAFFIC FOR P2P FILE SHARING PROTOCOL USING OPNET GROUP 01

ENSC 427 SPRING 2011 FINAL PROJECT EXPLORING TRAFFIC FOR P2P FILE SHARING PROTOCOL USING OPNET GROUP 01 SFU Communication Networks ENSC 427 SPRING 2011 FINAL PROJECT EXPLORING TRAFFIC FOR P2P FILE SHARING PROTOCOL USING OPNET GROUP 01 Abhishek Dubey ada4@sfu.ca Ashkan Mirnabavvi amirnaba@sfu.ca Vikas Yadav

More information

VXLAN Overview: Cisco Nexus 9000 Series Switches

VXLAN Overview: Cisco Nexus 9000 Series Switches White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Communication Networks Simulation of Communication Networks

Communication Networks Simulation of Communication Networks Communication Networks Simulation of Communication Networks Silvia Krug 01.02.2016 Contents 1 Motivation 2 Definition 3 Simulation Environments 4 Simulation 5 Tool Examples Motivation So far: Different

More information

On the Relationship of Server Disk Workloads and Client File Requests

On the Relationship of Server Disk Workloads and Client File Requests On the Relationship of Server Workloads and Client File Requests John R. Heath Department of Computer Science University of Southern Maine Portland, Maine 43 Stephen A.R. Houser University Computing Technologies

More information

Network Layer Mobility: an Architecture and Survey. Yorktown Heights, NY College Park, MD 20742

Network Layer Mobility: an Architecture and Survey. Yorktown Heights, NY College Park, MD 20742 Network Layer Mobility: an Architecture and Survey Pravin Bhagwat y Charles Perkins y Satish Tripathi z 1 Introduction y IBM, T.J. Watson Research Center z Computer Science Department P.O. Box 704 University

More information

Intelligent Optimization Methods for High-Dimensional Data Classification for Support Vector Machines

Intelligent Optimization Methods for High-Dimensional Data Classification for Support Vector Machines Intelligent Inormation Management, 200, 2, ***-*** doi:0.4236/iim.200.26043 Published Online June 200 (http://www.scirp.org/journal/iim) Intelligent Optimization Methods or High-Dimensional Data Classiication

More information

Automatic Video Segmentation for Czech TV Broadcast Transcription

Automatic Video Segmentation for Czech TV Broadcast Transcription Automatic Video Segmentation or Czech TV Broadcast Transcription Jose Chaloupka Laboratory o Computer Speech Processing, Institute o Inormation Technology and Electronics Technical University o Liberec

More information

Lecture (02) Network Protocols and Standards

Lecture (02) Network Protocols and Standards Lecture (02) Network Protocols and Standards Dr. Ahmed M. ElShafee 1 Agenda - - 2 Preface Protocols and standards are what make networks work together. Protocols make it possible for the various components

More information

FPGA PLB EVALUATION USING QUANTIFIED BOOLEAN SATISFIABILITY

FPGA PLB EVALUATION USING QUANTIFIED BOOLEAN SATISFIABILITY FPGA PLB EVALUATION USING QUANTIFIED BOOLEAN SATISFIABILITY Andrew C. Ling Electrical and Computer Engineering University o Toronto Toronto, CANADA email: aling@eecg.toronto.edu Deshanand P. Singh, Stephen

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

Section II. Nios II Software Development

Section II. Nios II Software Development Section II. Nios II Sotware Development This section o the Embedded Design Handbook describes how to most eectively use the Altera tools or embedded system sotware development, and recommends design styles

More information

Survey of the State of P2P File Sharing Applications

Survey of the State of P2P File Sharing Applications Survey of the State of P2P File Sharing Applications Keita Ooi, Satoshi Kamei, and Tatsuya Mori Abstract Recent improvements in Internet access have been accompanied by a dramatic spread of peer-to-peer

More information

A Proposed Approach for Solving Rough Bi-Level. Programming Problems by Genetic Algorithm

A Proposed Approach for Solving Rough Bi-Level. Programming Problems by Genetic Algorithm Int J Contemp Math Sciences, Vol 6, 0, no 0, 45 465 A Proposed Approach or Solving Rough Bi-Level Programming Problems by Genetic Algorithm M S Osman Department o Basic Science, Higher Technological Institute

More information

3.2 COMMUNICATION AND INTERNET TECHNOLOGIES

3.2 COMMUNICATION AND INTERNET TECHNOLOGIES 3.2 COMMUNICATION AND INTERNET TECHNOLOGIES 3.2.1 PROTOCOLS PROTOCOL Protocol a set of rules governing the way that devices communicate with each other. With networks and the Internet, we need to allow

More information

Technical Report. A Tighter Real-Time Communication Analysis for Wormhole-Switched Priority-Preemptive NoCs

Technical Report. A Tighter Real-Time Communication Analysis for Wormhole-Switched Priority-Preemptive NoCs Technical Report A Tighter Real-Time Communication Analysis or Wormhole-Switched Priority-Preemptive NoCs Borislav Nikolic Leandro Soares Indrusiak Stean M. Petters CISTER-TR-17111 Technical Report CISTER-TR-17111

More information

Nfsight Ne*low- based Network Awareness Tool

Nfsight Ne*low- based Network Awareness Tool LISA 10 Nov 7-12, 2010 San Jose, CA Nfsight Ne*low- based Network Awareness Tool Robin Berthier (University of Illinois at Urbana- Champaign) Michel Cukier (University of Maryland) Ma3 Hiltunen (AT&T Research)

More information

On the Stability of the Information Carried by Traffic Flow Features at the Packet Level

On the Stability of the Information Carried by Traffic Flow Features at the Packet Level On the Stability of the Information Carried by Traffic Flow Features at the Packet Level Alice Este, Francesco Gringoli, Luca Salgarelli DEA, Università degli Studi di Brescia, Italy Email: @ing.unibs.it

More information

Enhancing Bandwidth Utilization and QoS in Optical Burst Switched High-Speed Network

Enhancing Bandwidth Utilization and QoS in Optical Burst Switched High-Speed Network 91 Enhancing Bandwidth Utilization and QoS in Optical Burst Switched High-Speed Network Amit Kumar Garg and R S Kaler School of Electronics and Communication Eng, Shri Mata Vaishno Devi University (J&K),

More information

Shortest-hop Based Reliable Network Multicast

Shortest-hop Based Reliable Network Multicast Shortest-hop Based Reliable Network Multicast K.L. Eddie Law, Daniel Siu Ryerson University, Toronto, Canada. Email: eddie@ee.ryerson.ca IBM Canada, Toronto, Canada. Email: siud@sympatico.ca Absact Although

More information

Power of Slicing in Internet Flow Measurement. Ramana Rao Kompella Cristian Estan

Power of Slicing in Internet Flow Measurement. Ramana Rao Kompella Cristian Estan Power of Slicing in Internet Flow Measurement Ramana Rao Kompella Cristian Estan 1 IP Network Management Network Operator What is happening in my network? How much traffic flows towards a given destination?

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Differentiating Link State Advertizements to Optimize Control Overhead in Overlay Networks

Differentiating Link State Advertizements to Optimize Control Overhead in Overlay Networks Differentiating Link State Advertizements to Optimize Control Overhead in Overlay Networks Mathieu Bouet, Julien Boite, Jérémie Leguay and Vania Conan Thales Communications & Security, Paris, France Abstract

More information

Method estimating reflection coefficients of adaptive lattice filter and its application to system identification

Method estimating reflection coefficients of adaptive lattice filter and its application to system identification Acoust. Sci. & Tech. 28, 2 (27) PAPER #27 The Acoustical Society o Japan Method estimating relection coeicients o adaptive lattice ilter and its application to system identiication Kensaku Fujii 1;, Masaaki

More information

Performance Consequences of Partial RED Deployment

Performance Consequences of Partial RED Deployment Performance Consequences of Partial RED Deployment Brian Bowers and Nathan C. Burnett CS740 - Advanced Networks University of Wisconsin - Madison ABSTRACT The Internet is slowly adopting routers utilizing

More information

9. Reviewing Printed Circuit Board Schematics with the Quartus II Software

9. Reviewing Printed Circuit Board Schematics with the Quartus II Software November 2012 QII52019-12.1.0 9. Reviewing Printed Circuit Board Schematics with the Quartus II Sotware QII52019-12.1.0 This chapter provides guidelines or reviewing printed circuit board (PCB) schematics

More information

A Resource Allocation Controller for Cloud-based Adaptive Video Streaming

A Resource Allocation Controller for Cloud-based Adaptive Video Streaming A Resource Allocation Controller or Cloud-based Adaptive Video Streaming Luca De Cicco, Saverio Mascolo, and Dario Calamita Abstract Video streaming accounts today or more than hal o the global Internet

More information

Joint Congestion Control and Scheduling in Wireless Networks with Network Coding

Joint Congestion Control and Scheduling in Wireless Networks with Network Coding Title Joint Congestion Control and Scheduling in Wireless Networks with Network Coding Authors Hou, R; Wong Lui, KS; Li, J Citation IEEE Transactions on Vehicular Technology, 2014, v. 63 n. 7, p. 3304-3317

More information

Improved Simultaneous Localization and Mapping using a Dual Representation of the Environment

Improved Simultaneous Localization and Mapping using a Dual Representation of the Environment Improved Simultaneous Localization and Mapping using a Dual Representation o the Environment Kai M. Wurm Cyrill Stachniss Giorgio Grisetti Wolram Burgard University o Freiburg, Dept. o Computer Science,

More information

On characterizing BGP routing table growth

On characterizing BGP routing table growth University of Massachusetts Amherst From the SelectedWorks of Lixin Gao 00 On characterizing BGP routing table growth T Bu LX Gao D Towsley Available at: https://works.bepress.com/lixin_gao/66/ On Characterizing

More information

Study and Analysis of Edge Detection and Implementation of Fuzzy Set. Theory Based Edge Detection Technique in Digital Images

Study and Analysis of Edge Detection and Implementation of Fuzzy Set. Theory Based Edge Detection Technique in Digital Images Study and Analysis o Edge Detection and Implementation o Fuzzy Set Theory Based Edge Detection Technique in Digital Images Anju K S Assistant Proessor, Department o Computer Science Baselios Mathews II

More information

A Fault Model Centered Modeling Framework for Self-healing Computing Systems

A Fault Model Centered Modeling Framework for Self-healing Computing Systems A Fault Model Centered Modeling Framework or Sel-healing Computing Systems Wei Lu 1, Yian Zhu 1, Chunyan Ma 1, and Longmei Zhang 2 1 Department o Sotware and Microelectronics, Northwestern Polytechnical

More information

Peer Assisted Content Distribution over Router Assisted Overlay Multicast

Peer Assisted Content Distribution over Router Assisted Overlay Multicast Peer Assisted Content Distribution over Router Assisted Overlay Multicast George Xylomenos, Konstantinos Katsaros and Vasileios P. Kemerlis Mobile Multimedia Laboratory & Department of Informatics Athens

More information

2. Getting Started with the Graphical User Interface

2. Getting Started with the Graphical User Interface February 2011 NII52017-10.1.0 2. Getting Started with the Graphical User Interace NII52017-10.1.0 The Nios II Sotware Build Tools (SBT) or Eclipse is a set o plugins based on the popular Eclipse ramework

More information

MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM

MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM UDC 681.3.06 MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM V.K. Pogrebnoy TPU Institute «Cybernetic centre» E-mail: vk@ad.cctpu.edu.ru Matrix algorithm o solving graph cutting problem has been suggested.

More information

Mining-based File Caching in a Hybrid Storage System

Mining-based File Caching in a Hybrid Storage System JOURNAL OF INFORMATION SCIENCE AND ENGINEERING XX, XXX-XXX (2013) Mining-based File Caching in a Hybrid Storage System Hanyang University 222 Wangsimni-ro, Seongdong-gu, Seoul, Korea E-mail:{insight; yjwon}@hanyang.ac.kr,

More information