On the Double-Faced Nature of P2P Traffic

Size: px
Start display at page:

Download "On the Double-Faced Nature of P2P Traffic"

Transcription

1 On the Double-Faced Nature o P2P Traic Raaele Bolla, Marco Canini, Riccardo Rapuzzi, Michele Sciuto DIST - Department o Communication, Computer and System Sciences, University o Genoa Via Opera Pia 13, 16145, Genova, Italy {raaele.bolla, marco.canini, riccardo.rapuzzi, michele.sciuto}@unige.it Abstract Over the last ew years, peer-to-peer (P2P) ile sharing applications have evolved to become a major traic source in the Internet. The ability to quantiy their impact on the network, as a consequence o both signaling and download traic, is undamental to a number o network operations, including traic engineering, capacity planning, quality o service, orecasting or long-term provisioning, etc. We present here a measurement study on the characteristics o the traic associated with dierent P2P applications. Our aim is to oer useul insight into the nature o P2P traic, which we consider a step toward building P2P traic aggregates generators in simulative environments. We show that P2P traic can be divided into two distinguished behavioral proiles, which, independently o the application protocol, present signiicant dierences in the average and standard deviation o our measurements: arrival times, durations, volumes and average packet sizes o P2P conversations. These proiles well represent the typical behavior o signaling and download traic. Based on our indings, we argue that, i such distinction is not taken into account, the statistical measurements needed to model P2P traic aggregates would result biased, and potentially bring to misleading results. 1 Introduction Over the last ew years, peer-to-peer (P2P) ile sharing applications have evolved to become a major traic source in the Internet. Plus, the successul P2P paradigm is now used by an increasing number o systems to oer eicient and scalable services ranging rom content distribution, network TV, voice-over-ip to sotware updates. An important consequence related to the appearance o P2P systems is related to the high traic volumes caused by these applications. The ability to quantiy their impact on the network, as a consequence o both signaling and download traic, is undamental to a number o network operations, including traic engineering, capacity planning, quality o service, orecasting or long-term provisioning, etc. We present here a measurement study on the characteristics o the traic associated with dierent P2P applications. We identiy P2P traic in our data sets by using a payload classiier based on pattern matching. We develop a characterization o this traic that ocuses towards its behavior as it is experienced at the network layer. In this work, which grounds up on our previous work in [1], we deine a measurement, Content Transer Index, to distinguish two classes o behavior or P2P traic: the download and the signaling traic proile. Finally, we show that these two proiles present relevant dierences in the average and standard deviation o our measurements: arrival times, durations, volumes and average packet sizes. Based on our indings, we argue that the statistical measurements needed to model P2P traic aggregates would result biased, and potentially bring to misleading results, i its two-aced nature is not taken into account. We believe this work gives a sincere contribution towards building P2P traic aggregates generators in simulative environments. Our work is similar to [1], but it is dierent in that: (i) we don t limit our study to the edonkey protocol, and (ii) we identiy the P2P traic in our data sets by using a payload classiier, rather than the application port numbers. As their results are comparable with the ones reported in this paper, we consider promising our approach, which doesn t rely on the protocol opcode inormation to distinguish download rom signaling traic. In another related work [2], the authors have analyzed BitTorrent traic characteristics, using an instrumented version o the oicial client. They suggest that conversation durations and sizes can be reasonably well approximated by the lognormal distribution, which is also conirmed in our results. A complementary work is [3], where the authors model and characterize BitTorrent-like systems by using measurements at the application layer. The remainder o this paper is organized as ollows. In Section 2, we describe how we identiied P2P traic in our data sets. In Section 3, we present our characterization o

2 P2P traic. The results o this characterization applied to a number o measurements are shown in Section 4. Finally, Section 5 concludes the paper. 2 collection We analyzed traces contemporarily collected or 46 consecutive hours, at two dierent links o the university s campus network. For both traces, we captured every packet seen on each direction o the links along with its ull payload and we removed the link layer header (i.e., Ethernet). To capture the irst trace (DEPT), the monitor was located on the link connecting our department to the campus network. The second trace (GENUA) was captured by monitoring the campus connection to the Internet. We ignore the TCP connections or which we don t observe the triple handshake. Table 1 lists general workload dimensions o our data sets: counts o distinct source and destination IP addresses, the number o lows, packets, and bytes observed. In this study we deine lows as unidirectional, while we use conversation to denote bidirectional traic, i.e., a conversation is composed by two lows: traic rom A to B, and traic rom B to A. Each low is always identiied by two end points consisting o {IP, port} pairs and the transport level protocol. In the case o the UDP, we set a timeout o 6 seconds to determine the end o a conversation. We used an open source tool, namely ipp2p [4], to classiy the P2P traic in our traces. It identiies P2P lows via pattern matching, i.e., searching the payload content o the packets or known protocol signatures. This classiier acts every time a packet is received, and marks a conversation as identiied as soon as a known pattern is ound in at least one o its directions. For scalability reasons, only up to the irst N packets o each conversation are tested. N is a user conigurable parameter, that we set to 1 as done in [9]. Because this tool is not available as an o-line, trace processing tool (it is originally meant to be deployed in the Linux s iptables irewall or traic shaping purposes), we ported its source code to the Click Modular Router [7], which we used as a viable analysis ramework [6]. We validated our version o the tool against its original version by comparing the results obtained rom the classiication o our data sets. The outputs were indeed the same. Finally, we collated the classiication results obtained with our ipp2p classiier with the output o the payload classiier used to validate BLINC [5], obtaining very close results on our data sets. In this paper, we present results obtained using the GENUA data set; the results or the DEPT data set are similar and not presented here due to lack o space. Table 2 presents the volumes o P2P traic in GENUA trace, divided by P2P application. The values express the percentage with respect to the total amount o P2P traic. Both the traces are 46 hours long. Set Src. IP Dst. IP Flows Packets Bytes DEPT K K 16.8 M M 13.3 G GENUA 4.2 M 2.5 M 12. M 1.4 G 883. G Table 1. General workload dimensions o our traces Protocol Flows Packets Bytes Payload [%] [%] [%] Bytes [%] edonkey 83,78 46,19 42,12 41,88 BitTorrent 13,65 37,19 45,72 46,33 DC,34 7,5 9,99 1,23 Gnutella 2,21 9,11 2,16 1,56 Table 2. Breakdown by protocol o P2P traic in the GENUA data set In the remainder o the paper we mainly ocus on the traic generated by edonkey and BitTorrent, since this constitutes the majority in our campus network 1. However, we also report results about the traic associated with Gnutella and DirectConnect. 3 P2P traic characterization P2P traic can be roughly divided into download traic and signaling traic: the irst is caused by the transer o content, the latter is mainly due to the presence o an overlay network, and possibly a search service. A way to accurately dierentiate download rom signaling traic would be to implement a protocol analyzer. Although one can leverage existing tools, e.g. binpac [8], to build protocol analyzers, this solution has several drawbacks: (i) it requires speciic knowledge o P2P protocols; (ii) it demands access to the payload o each packet; (iii) building analyzers or a signiicant number o protocols is deinitely time consuming. Moreover, it is our desire to oer a characterization o P2P traic that ocuses towards its behavior as it is observable at the network level through simple passive measurements, including volumes o transerred content, conversations arrival times and durations, and average packet sizes. In our approach we identiy two behavioral classes that we shall reer to as the download and the signaling traic proile. To some extents we re abusing the terminologies, as it is possible, though not common, that a download conversation can exhibit the typical characteristics o signaling 1 P2P traic is believed to be hazardous or networks, and our campus network makes no exception. We are aware that a iltering system has been deployed, realizing traic shaping or the most common P2P applications.

3 [%] F [%] F (a) edonkey -TCP (b) BitTorrent - TCP [%] F [%] F (c) edonkey - UDP (d) DirectConnect - TCP Figure 1. Relationships between the conversations, payload bytes and the. The histograms are plotted with bin size.1 traic 2 and vice versa. However, we are mostly interested in distinguishing the conversations by considering the actual eects that they pose on the network, treating P2P with generality, rather then by using an accurate identiication o their role. We ground our approach on a simple intuition. The idea is that, during a ile download, a peer, on average, gets packets illed up to the maximum segment size (MSS) and sends back ewer packets to acknowledge the received data. Even when the peers are exchanging pieces o a single ile with one another (as realized in BitTorrent), causing balanced conversations, still, the average payload size tends to reach the MSS. Conversely, the signaling conversations are characterized by a latter proile, consisting o a more even count o exchanged bytes and packets. The accurate identiication o edonkey conversations 3 in our traces supports our intuition. In order to quantiy the dierences between these traic proiles we ormalize a measurement that oers a statistical characterization o P2P traic. We deine the Content Transer Index () o a conversation C as: F + F P MSS(C) + + F p MSS(C) [,1], where F, are the lengths o the two lows constituting C, such that F. One can use three dierent low ea- 2 E.g., early truncated downloads are not clearly distinguishable rom signaling conversations. 3 As done in [1], we classiy edonkey conversations to be download i one o its packets contains at least one o the edonkey protocol opcodes OP SENDINGPART or OP COMPRESSEDPART. tures to represent its length: the packet count, the count o payload bytes and the count o headers and payload bytes. We present here the results obtained by using the count o payload bytes as the low length. P and p represent the average number o payload bytes per packet calculated or the low with length F and respectively. The MSS o the conversation C is expressed as MSS(C). For the UDP, we assume that the MSS corresponds to the maximum transer unit (MTU) minus the IP and UDP headers lengths. Hence, given a pair o end points {A, B}, the gives an indication o how the content is transerred. At the opposite end o the spectrum there are two distinct traic proiles: when the conversation is latter or balanced (i.e., A and B exchange an even quantity o content, mainly using packets whose payload size is ar rom the MSS), the s value tends to zero; when the conversation is rich o content which is either transerred rom a single end point that dominates the conversation (unbalanced), or eiciently exchanged between the two end points, the s value tends to one. Figure 1(a), 1(b), 1(c) and 1(d) present a graphical visualization o the relationships between the conversations, payload bytes and the o edonkey TCP, BitTorrent TCP, edonkey UDP and DirectConnect TCP conversations respectively. Each igure shows three overlapping histograms, symbolizing the ollowing igures corresponding to the same range: the number o conversations, the

4 summation o the minimum and maximum length lows o the conversations (denoted with F + ) and the summation o just the minimum length lows (denoted with ). The number o conversations is normalized to the total number o conversations, while both summations o minimum and maximum length lows, and o just the minimum length lows are normalized to the total count o payload bytes. All the graphs but Figure 1(c) clearly show two distinctive proiles: containing most o the conversations, the signaling proile is having values below.2, whereas above.2, the download proile is dominated by the payload bytes. Also note in the signaling proiles that the conversations are quite balanced. As expected, the edonkey UDP conversations, that are carrying extended searches, generate a graph in which no conversation has value above.2. The same happens in the graph o Gnutella TCP conversation (that we omit or the lack o space), as the download traic o this protocol is eiciently iltered by the campus border router. Figure 1(d) contains a drastic example o how the two traic behave dierently: almost all the traic identiied as DirectConnect, accounting or 1.23% o the total P2P traic, is moved by just very ew conversations (.2% o the total P2P conversations), while the 94% o DirectConnect conversations transer an extremely small amount o data. Throughout the rest o the paper, we divide P2P traic into download vs. signaling by using the s value. In particular we use a threshold to distinguish the two classes: a conversation with a s value above the threshold is marked as a download conversation, while a value below the threshold determines a signaling conversation. We set the threshold to.2. This value was already used in our previous work in [1] which oers a validation o the, and it is visually derivable rom Figure 1. 4 Results In this section we present the results obtained by measuring arrival times, durations, volumes and average payload sizes o the download and signaling P2P conversations. For each measure, we report the measured data along with the best itting 4 statistical distribution and its parameters. We considered the ollowing candidate distributions: exponential, Pareto, lognormal, and. Note that we present the parameters in order to oer a numerical comparison o the empirical data across dierent protocols and traic proiles. Because these are preliminary results o this work, we are not suggesting to use them directly in the modeling o P2P traic aggregate generators, as this still require a deeper investigation. Arrival times. Figure 2 shows the s o the down- 4 By using the nonlinear least-squares method. load and signaling conversation arrival times, or edonkey and BitTorrent TCP traic. Table 3 lists their average and standard deviation. In all the our graphs, the best itting distribution is. Its parameters are more comparable when looking at the same traic proile rather then the same protocol. It is clear rom Table 3 that measuring the whole P2P traic or a given protocol leads to inaccurate values o the average and standard deviation o conversation arrival times, as there is a signiicant dierence between the values measured or download and signaling traic. Conversation type Avg. [s] Std. dev. [s] edonkey - download edonkey - signaling edonkey - all.1.15 BitTorrent - download BitTorrent - signaling BitTorrent - all Table 3. Average and standard deviation o the conversation arrival times [s] Durations. The s o the download and signaling conversation durations are shown in Figure 3, plotted or edonkey and BitTorrent TCP traic. The lognormal is the best itting distribution in all the our graphs. Table 4 lists their average and standard deviation. Interestingly the proiles o the download conversation durations are quite similar and the parameters o the itted lognormals are numerically very close, while the behavior o signaling traic is not so similar. We believe this is mostly due to the absence o a search service in the BitTorrent system, which is on the contrary available in the edonkey network. Once again, both the graphs and Table 4 indicate that the behavior o download and signaling traic is dierent. Measuring the P2P traic without distinguishing download rom signaling traic leads to inaccurate values or the average and standard deviation o conversation durations. Conversation type Avg. [s] Std. dev. [s] edonkey - download edonkey - signaling edonkey - all BitTorrent - download BitTorrent - signaling BitTorrent - all Table 4. Average and standard deviation o conversation durations [s] Volumes. Figure 4 reports the s o the conver-

5 (a) edonkey - download; λ = 1.53; κ = (c) edonkey - signaling; λ =.7; κ = (b) BitTorrent - download ; λ = 2.38; κ = (d) BitTorrent - signaling; λ =.82; κ =.77 Figure 2. o the conversation arrival times. κ and λ are the parameters sation volumes, plotted or edonkey and BitTorrent download and signaling traic. All the proiles are best itted by the lognormal distribution. The dierences in the parameters well reveal what is already clear in the graphs: download and signaling traic exhibit dierent proiles. The download conversation volumes are very similar or edonkey and BitTorrent, while the signaling ones are, on average, one order o magnitude smaller than the download conversation volumes or both protocols. Also note that we identiied some download conversations that are transerring hundreds o megabytes o data. Average payload sizes. Table 5 presents the average and standard deviantion o the download and signaling conversation average payload sizes, plotted or edonkey and Bit- Torrent TCP traic. The average payload size o a single conversation has been calculated as the mean o the average payload sizes o both lows or a signaling conversation, or as the maximum length low s average payload size in the case o a download conversation. Figure 5 present the relationships between the conversations, volumes and the average payload size or the signaling conversations o edonkey and BitTorrent. The graphs, which are realized using the same structure o Figure 1, show that there is signiicant dierence in terms o the average payload sizes used in these protocols. In particular, note that the conversations are more balanced or edonkey. We believe this relects the architectural dierences o the two P2P networks. However, or both protocols, there is no signaling conversation having average payload size greater than 3 bytes. Conversation type Avg. [bytes] Std. dev. [bytes] edonkey - download edonkey - signaling edonkey All BitTorrent - download BitTorrent - signaling BitTorrent All Table 5. Average and standard deviation o the conversation average payload sizes 5 Conclusion In this paper, we have presented a measurement study o P2P traic. We have irst applied the Content Transer Index to distinguish the traic into two classes o behavior: the download and the signaling traic proile. Based on this distinction, we have realized a number o measurements and shown that there are signiicant dierences in their average and standard deviation rom the case where the distinction is not taken into account. In particular, our measures result unbiased. These results indicate that the double-aced nature o P2P traic should be taken into account in modeling P2P traic aggregates. Acknowledgment This work was supported by the MIUR-PRIN unded project FAMOUS Fluid Analytical Models O autonomic Systems and by the MIUR-PRIN unded project RECIPE

6 (a) edonkey - download; µ = 5.5; σ = (c) edonkey - signaling; µ = 3.79; σ = (b) BitTorrent - download; µ = 5.97; σ = (d) BitTorrent - signaling; µ = 1.47; σ = 2.81 Figure 3. o the conversation durations. µ and σ are the lognormal parameters (a) edonkey - download; µ = 1.35; σ = (c) edonkey - signaling; µ = 6.18; σ = (b) BitTorrent - download; µ = 1.86; σ = (d) BitTorrent - signaling; µ = 5.73; σ = 1.54 Figure 4. o the conversation volumes. µ and σ are the lognormal parameters Robust and Eicient traic Classiication in IP networks. We would like to thank CSITA or supporting us in this research. Reerences [1] R. Bolla, M. Canini, R. Rapuzzi, and M. Sciuto. Characterizing the network behavior o P2P traic. In Proceedings o 4th International Telecommunication Networking Workshop on Qos in Multiservice IP Networks (QoS-IP), Feb. 28. to appear. [2] D. Erman, D. Ilie, and A. Popescu. Bittorrent session characteristics and models. In HET-NETs 5 Conerence Proceedings, July 25. [3] L. Guo, S. Chen,, Z. Xiao, E. Tan, X. Ding, and X. Zhang. Measurements, analysis, and modeling o bittorrent-like systems. In Proceedings o Internet Measurement Conerence, pages 35 48, Oct. 25. [4] IPP2P. [5] T. Karagiannis, K. Papagiannaki, and M. Faloutsos. BLINC: Multilevel traic classiication in the dark. In Proceedings o ACM Sigcomm, Aug. 25. [6] E. Kohler. Click or measurement. Technical Report TR61, UCLA Computer Science Department, Feb. 26. [7] E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek. The click modular router. ACM Transactions on Computer Systems, 18(3): , Aug. 2.

7 [%] F Average payload size [bytes] [%] F Average payload size [bytes] (a) edonkey - signaling (b) BitTorrent - signaling Figure 5. Relationships between the conversations, volumes and the average payload size. The histograms are plotted with bin size 1 bytes [8] R. Pang, V. Paxson, R. Sommer, and L. Peterson. binpac: A yacc or writing application protocol parsers. In Proceedings o ACM Sigcomm Internet Measurement Conerence, Oct. 26. [9] S. Sen, O. Spatscheck, and D. Wang. Accurate, scalable innetwork identiication o P2P traic using application signatures. In Proceedings o the 13th international conerence on World Wide Web, May 24. [1] K. Tutschku. A measurement-based traic proile o the edonkey ilesharing service. In Proceedings o PAM, Apr. 24.

Characterizing the network behavior of P2P traffic

Characterizing the network behavior of P2P traffic Characterizing the network behavior o PP traic Raaele Bolla, Marco Canini, Riccardo Rapuzzi, Michele Sciuto DIST - Department o Communication, Computer and System Sciences, University o Genoa Via Opera

More information

Monitoring and Classification of Teletraffic in P2P Environment

Monitoring and Classification of Teletraffic in P2P Environment Monitoring and Classification of Teletraffic in P2P Environment Raffaele Bolla, Riccardo Rapuzzi, Michele Sciuto DIST - Department of Communication, Computer and System Sciences University of Genoa Via

More information

A Method of Identifying the P2P File Sharing

A Method of Identifying the P2P File Sharing IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications

More information

BotCop: An Online Botnet Traffic Classifier

BotCop: An Online Botnet Traffic Classifier 2009 Seventh Annual Communications Networks and Services Research Conerence BotCop: An Online Botnet Traic Classiier Wei Lu, Mahbod Tavallaee, Goaletsa Rammidi and Ali A. Ghorbani Faculty o Computer Science

More information

Analysis of WLAN Traffic in the Wild

Analysis of WLAN Traffic in the Wild Analysis of WLAN Traffic in the Wild Caleb Phillips and Suresh Singh Portland State University, 1900 SW 4th Avenue Portland, Oregon, 97201, USA {calebp,singh}@cs.pdx.edu Abstract. In this paper, we analyze

More information

BLINC: Multilevel Traffic Classification in the Dark

BLINC: Multilevel Traffic Classification in the Dark BLINC: Multilevel Traffic Classification in the Dark Thomas Karagiannis, UC Riverside Konstantina Papagiannaki, Intel Research Cambridge Michalis Faloutsos, UC Riverside The problem of workload characterization

More information

Multicast Transport Protocol Analysis: Self-Similar Sources *

Multicast Transport Protocol Analysis: Self-Similar Sources * Multicast Transport Protocol Analysis: Self-Similar Sources * Mine Çağlar 1 Öznur Özkasap 2 1 Koç University, Department of Mathematics, Istanbul, Turkey 2 Koç University, Department of Computer Engineering,

More information

Applying fair queueing and traffic shaping for Internet applications on top of ATM The LB_SCFQ algorithm

Applying fair queueing and traffic shaping for Internet applications on top of ATM The LB_SCFQ algorithm Applying air queueing and traic shaping or Internet applications on top o ATM The LB_SCFQ algorithm Abstract Fair queueing mechanisms give very promising results or ATM networks. Combining a air queueing

More information

A Hybrid Approach for Accurate Application Traffic Identification

A Hybrid Approach for Accurate Application Traffic Identification A Hybrid Approach for Accurate Application Traffic Identification Thesis Defence December 21, 2005 Young J. Won yjwon@postech.ac.kr Distributed Processing & Network Management Lab. Dept. of Computer Science

More information

A Requirement Specification Language for Configuration Dynamics of Multiagent Systems

A Requirement Specification Language for Configuration Dynamics of Multiagent Systems A Requirement Speciication Language or Coniguration Dynamics o Multiagent Systems Mehdi Dastani, Catholijn M. Jonker, Jan Treur* Vrije Universiteit Amsterdam, Department o Artiicial Intelligence, De Boelelaan

More information

AN 608: HST Jitter and BER Estimator Tool for Stratix IV GX and GT Devices

AN 608: HST Jitter and BER Estimator Tool for Stratix IV GX and GT Devices AN 608: HST Jitter and BER Estimator Tool or Stratix IV GX and GT Devices July 2010 AN-608-1.0 The high-speed communication link design toolkit (HST) jitter and bit error rate (BER) estimator tool is a

More information

Automated Modelization of Dynamic Systems

Automated Modelization of Dynamic Systems Automated Modelization o Dynamic Systems Ivan Perl, Aleksandr Penskoi ITMO University Saint-Petersburg, Russia ivan.perl, aleksandr.penskoi@corp.imo.ru Abstract Nowadays, dierent kinds o modelling settled

More information

A Fluid-Flow Characterization of Internet1 and Internet2 Traffic *

A Fluid-Flow Characterization of Internet1 and Internet2 Traffic * A Fluid-Flow Characterization of Internet1 and Internet2 Traffic * Joe Rogers and Kenneth J. Christensen Department of Computer Science and Engineering University of South Florida Tampa, Florida 33620

More information

9.8 Graphing Rational Functions

9.8 Graphing Rational Functions 9. Graphing Rational Functions Lets begin with a deinition. Deinition: Rational Function A rational unction is a unction o the orm P where P and Q are polynomials. Q An eample o a simple rational unction

More information

An Optimized Method for Analyzing the Peer to Peer Traffic

An Optimized Method for Analyzing the Peer to Peer Traffic European Journal of Scientific Research ISSN 1450-216X Vol.34 No.4 (2009), pp.535-541 EuroJournals Publishing, Inc. 2009 http://www.eurojournals.com/ejsr.htm An Optimized Method for Analyzing the Peer

More information

Classification Method for Colored Natural Textures Using Gabor Filtering

Classification Method for Colored Natural Textures Using Gabor Filtering Classiication Method or Colored Natural Textures Using Gabor Filtering Leena Lepistö 1, Iivari Kunttu 1, Jorma Autio 2, and Ari Visa 1, 1 Tampere University o Technology Institute o Signal Processing P.

More information

Neighbourhood Operations

Neighbourhood Operations Neighbourhood Operations Neighbourhood operations simply operate on a larger neighbourhood o piels than point operations Origin Neighbourhoods are mostly a rectangle around a central piel Any size rectangle

More information

First Video Streaming Experiments on a Time Driven Priority Network

First Video Streaming Experiments on a Time Driven Priority Network First Video Streaming Experiments on a Driven Priority Network Mario Baldi and Guido Marchetto Department o Control and Computer Engineering Politecnico di Torino (Technical University o Torino) Abstract

More information

ITU - Telecommunication Standardization Sector. G.fast: Far-end crosstalk in twisted pair cabling; measurements and modelling ABSTRACT

ITU - Telecommunication Standardization Sector. G.fast: Far-end crosstalk in twisted pair cabling; measurements and modelling ABSTRACT ITU - Telecommunication Standardization Sector STUDY GROUP 15 Temporary Document 11RV-22 Original: English Richmond, VA. - 3-1 Nov. 211 Question: 4/15 SOURCE 1 : TNO TITLE: G.ast: Far-end crosstalk in

More information

Visualization of Internet Traffic Features

Visualization of Internet Traffic Features Visualization of Internet Traffic Features Jiraporn Pongsiri, Mital Parikh, Miroslova Raspopovic and Kavitha Chandra Center for Advanced Computation and Telecommunications University of Massachusetts Lowell,

More information

SVILUPPO DI UNA TECNICA DI RICONOSCIMENTO STATISTICO DI APPLICAZIONI SU RETE IP

SVILUPPO DI UNA TECNICA DI RICONOSCIMENTO STATISTICO DI APPLICAZIONI SU RETE IP UNIVERSITÀ DEGLI STUDI DI PARMA FACOLTÀ di INGEGNERIA Corso di Laurea Specialistica in Ingegneria delle Telecomunicazioni SVILUPPO DI UNA TECNICA DI RICONOSCIMENTO STATISTICO DI APPLICAZIONI SU RETE IP

More information

A Classification System and Analysis for Aspect-Oriented Programs

A Classification System and Analysis for Aspect-Oriented Programs A Classiication System and Analysis or Aspect-Oriented Programs Martin Rinard, Alexandru Sălcianu, and Suhabe Bugrara Massachusetts Institute o Technology Cambridge, MA 02139 ABSTRACT We present a new

More information

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Timothy Glennan, Christopher Leckie, Sarah M. Erfani Department of Computing and Information Systems,

More information

Discrete-Approximation of Measured Round Trip Time Distributions: A Model for Network Emulation

Discrete-Approximation of Measured Round Trip Time Distributions: A Model for Network Emulation Discrete-Approximation of Measured Round Trip Time Distributions: A Model for Network Emulation Jay Aikat*, Shaddi Hasan +, Kevin Jeffay*, and F. Donelson Smith* *University of North Carolina at Chapel

More information

Abstract. I. Introduction

Abstract. I. Introduction 46th AIAA/ASME/ASCE/AHS/ASC Structures, Structural Dynamics & Materials Conerence 8 - April 005, Austin, Texas AIAA 005-83 M Intuitive Design Selection Using Visualized n-dimensional Pareto Frontier G.

More information

Reduce the False Positive and False Negative from Real Traffic with Intrusion Detection

Reduce the False Positive and False Negative from Real Traffic with Intrusion Detection Research Inventy: International Journal Of Engineering And Science Vol.05, Issue 01 (January 2015), PP: 09-14 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.com Reduce the False Positive

More information

A Search Theoretical Approach to P2P Networks: Analysis of Learning

A Search Theoretical Approach to P2P Networks: Analysis of Learning A Search Theoretical Approach to P2P Networks: Analysis of Learning Nazif Cihan Taş Dept. of Computer Science University of Maryland College Park, MD 2742 Email: ctas@cs.umd.edu Bedri Kâmil Onur Taş Dept.

More information

Concavity. Notice the location of the tangents to each type of curve.

Concavity. Notice the location of the tangents to each type of curve. Concavity We ve seen how knowing where a unction is increasing and decreasing gives a us a good sense o the shape o its graph We can reine that sense o shape by determining which way the unction bends

More information

TO meet the increasing bandwidth demands and reduce

TO meet the increasing bandwidth demands and reduce Assembling TCP/IP Packets in Optical Burst Switched Networks Xiaojun Cao Jikai Li Yang Chen Chunming Qiao Department o Computer Science and Engineering State University o New York at Bualo Bualo, NY -

More information

9. Reviewing Printed Circuit Board Schematics with the Quartus II Software

9. Reviewing Printed Circuit Board Schematics with the Quartus II Software November 2012 QII52019-12.1.0 9. Reviewing Printed Circuit Board Schematics with the Quartus II Sotware QII52019-12.1.0 This chapter provides guidelines or reviewing printed circuit board (PCB) schematics

More information

10. SOPC Builder Component Development Walkthrough

10. SOPC Builder Component Development Walkthrough 10. SOPC Builder Component Development Walkthrough QII54007-9.0.0 Introduction This chapter describes the parts o a custom SOPC Builder component and guides you through the process o creating an example

More information

A simple mathematical model that considers the performance of an intermediate node having wavelength conversion capability

A simple mathematical model that considers the performance of an intermediate node having wavelength conversion capability A Simple Performance Analysis of a Core Node in an Optical Burst Switched Network Mohamed H. S. Morsy, student member, Mohamad Y. S. Sowailem, student member, and Hossam M. H. Shalaby, Senior member, IEEE

More information

TOWARDS HIGH-PERFORMANCE NETWORK APPLICATION IDENTIFICATION WITH AGGREGATE-FLOW CACHE

TOWARDS HIGH-PERFORMANCE NETWORK APPLICATION IDENTIFICATION WITH AGGREGATE-FLOW CACHE TOWARDS HIGH-PERFORMANCE NETWORK APPLICATION IDENTIFICATION WITH AGGREGATE-FLOW CACHE Fei He 1, 2, Fan Xiang 1, Yibo Xue 2,3 and Jun Li 2,3 1 Department of Automation, Tsinghua University, Beijing, China

More information

Road Sign Analysis Using Multisensory Data

Road Sign Analysis Using Multisensory Data Road Sign Analysis Using Multisensory Data R.J. López-Sastre, S. Lauente-Arroyo, P. Gil-Jiménez, P. Siegmann, and S. Maldonado-Bascón University o Alcalá, Department o Signal Theory and Communications

More information

An MMPP-Based Hierarchical Model of Internet Traffic

An MMPP-Based Hierarchical Model of Internet Traffic An MMPP-Based Hierarchical o Internet Traic L.Muscariello, M.Mellia, M.Meo, M.Ajmone Marsan Dipartimento di Elettronica, Politecnico di Torino, Italy R. Lo Cigno Dipartimento di Inormatica e Telecomunicazioni,

More information

A Synthetic Traffic Model for Half-Life

A Synthetic Traffic Model for Half-Life A Synthetic Traffic Model for Half-Life Tanja Lang, Grenville Armitage, Phillip Branch, Hwan-Yi Choo Centre for Advanced Internet Architectures Swinburne University of Technology Melbourne, Australia tlang@swin.edu.au,

More information

Can we trust the inter-packet time for traffic classification?

Can we trust the inter-packet time for traffic classification? Can we trust the inter-packet time for traffic classification? Mohamad Jaber, Roberto G. Cascella and Chadi Barakat INRIA Sophia Antipolis, EPI Planète 2004, Route des Luciolles Sophia Antipolis, France

More information

A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification

A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification Riyad Alshammari and A. Nur Zincir-Heywood Dalhousie University, Faculty of Computer Science {riyad,zincir}@cs.dal.ca

More information

On the Relationship of Server Disk Workloads and Client File Requests

On the Relationship of Server Disk Workloads and Client File Requests On the Relationship of Server Workloads and Client File Requests John R. Heath Department of Computer Science University of Southern Maine Portland, Maine 43 Stephen A.R. Houser University Computing Technologies

More information

Automatic Video Segmentation for Czech TV Broadcast Transcription

Automatic Video Segmentation for Czech TV Broadcast Transcription Automatic Video Segmentation or Czech TV Broadcast Transcription Jose Chaloupka Laboratory o Computer Speech Processing, Institute o Inormation Technology and Electronics Technical University o Liberec

More information

Interactive Monitoring, Visualization, and Configuration of OpenFlow-Based SDN

Interactive Monitoring, Visualization, and Configuration of OpenFlow-Based SDN Interactive Monitoring, Visualization, and Configuration of OpenFlow-Based SDN Pedro Heleno Isolani Juliano Araujo Wickboldt Cristiano Bonato Both Lisandro Zambenedetti Granville Juergen Rochol July 16,

More information

Classifier Evasion: Models and Open Problems

Classifier Evasion: Models and Open Problems Classiier Evasion: Models and Open Problems Blaine Nelson 1, Benjamin I. P. Rubinstein 2, Ling Huang 3, Anthony D. Joseph 1,3, and J. D. Tygar 1 1 UC Berkeley 2 Microsot Research 3 Intel Labs Berkeley

More information

Network traffic characterization

Network traffic characterization Network traffic characterization A historical perspective 1 Incoming AT&T traffic by port (18 hours of traffic to AT&T dial clients on July 22, 1997) Name port % bytes %packets bytes per packet world-wide-web

More information

Network traffic characterization. A historical perspective

Network traffic characterization. A historical perspective Network traffic characterization A historical perspective 1 Incoming AT&T traffic by port (18 hours of traffic to AT&T dial clients on July 22, 1997) Name port %bytes %packets bytes per packet world-wide-web

More information

CSE3213 Computer Network I

CSE3213 Computer Network I SE33 omputer Network I Service Model, Error ontrol, Flow ontrol, and Link Sharing (h. 5. 5.3. and 5.7.) ourse page: http://www.cse.yorku.ca/course/33 Slides modiied om lberto Leon-Garcia and Indra Widjaja

More information

A Fault Model Centered Modeling Framework for Self-healing Computing Systems

A Fault Model Centered Modeling Framework for Self-healing Computing Systems A Fault Model Centered Modeling Framework or Sel-healing Computing Systems Wei Lu 1, Yian Zhu 1, Chunyan Ma 1, and Longmei Zhang 2 1 Department o Sotware and Microelectronics, Northwestern Polytechnical

More information

Research Progress for the Interest Control Protocol of Content-centric Networking

Research Progress for the Interest Control Protocol of Content-centric Networking Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com Research Progress or the Interest Control Protocol o Content-centric Networing GAO QIANG, WANG WEIMING, ZHOU JINGJING Zhejiang Gongshang

More information

Week 7: Traffic Models and QoS

Week 7: Traffic Models and QoS Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

A STUDY ON COEXISTENCE OF WLAN AND WPAN USING A PAN COORDINATOR WITH AN ARRAY ANTENNA

A STUDY ON COEXISTENCE OF WLAN AND WPAN USING A PAN COORDINATOR WITH AN ARRAY ANTENNA A STUDY ON COEXISTENCE OF WLAN AND WPAN USING A PAN COORDINATOR WITH AN ARRAY ANTENNA Yuta NAKAO(Graduate School o Engineering, Division o Physics, Electrical and Computer Engineering, Yokohama National

More information

Method estimating reflection coefficients of adaptive lattice filter and its application to system identification

Method estimating reflection coefficients of adaptive lattice filter and its application to system identification Acoust. Sci. & Tech. 28, 2 (27) PAPER #27 The Acoustical Society o Japan Method estimating relection coeicients o adaptive lattice ilter and its application to system identiication Kensaku Fujii 1;, Masaaki

More information

Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes

Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Zhili Zhao Dept. of Elec. Engg., 214 Zachry College Station, TX 77843-3128 A. L. Narasimha Reddy

More information

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,

More information

Assessing the Nature of Internet traffic: Methods and Pitfalls

Assessing the Nature of Internet traffic: Methods and Pitfalls Assessing the Nature of Internet traffic: Methods and Pitfalls Wolfgang John Chalmers University of Technology, Sweden together with Min Zhang Beijing Jiaotong University, China Maurizio Dusi Università

More information

An Analytic Model for Embedded Machine Vision: Architecture and Performance Exploration

An Analytic Model for Embedded Machine Vision: Architecture and Performance Exploration 419 An Analytic Model or Embedded Machine Vision: Architecture and Perormance Exploration Chan Kit Wai, Prahlad Vadakkepat, Tan Kok Kiong Department o Electrical and Computer Engineering, 4 Engineering

More information

On TCP friendliness of VOIP traffic

On TCP friendliness of VOIP traffic On TCP friendliness of VOIP traffic By Rashmi Parthasarathy WSU ID # 10975537 A report submitted in partial fulfillment of the requirements of CptS 555 Electrical Engineering and Computer Science Department

More information

Core-Stateless Proportional Fair Queuing for AF Traffic

Core-Stateless Proportional Fair Queuing for AF Traffic Core-Stateless Proportional Fair Queuing for AF Traffic Gang Cheng, Kai Xu, Ye Tian, and Nirwan Ansari Advanced Networking Laboratory, Department of Electrical and Computer Engineering, New Jersey Institute

More information

On characterizing BGP routing table growth

On characterizing BGP routing table growth University of Massachusetts Amherst From the SelectedWorks of Lixin Gao 00 On characterizing BGP routing table growth T Bu LX Gao D Towsley Available at: https://works.bepress.com/lixin_gao/66/ On Characterizing

More information

Management of Protocol State

Management of Protocol State Management of Protocol State Ibrahim Matta December 2012 1 Introduction These notes highlight the main issues related to synchronizing the data at both sender and receiver of a protocol. For example, in

More information

Research on Image Splicing Based on Weighted POISSON Fusion

Research on Image Splicing Based on Weighted POISSON Fusion Research on Image Splicing Based on Weighted POISSO Fusion Dan Li, Ling Yuan*, Song Hu, Zeqi Wang School o Computer Science & Technology HuaZhong University o Science & Technology Wuhan, 430074, China

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

An Efficient Configuration Methodology for Time-Division Multiplexed Single Resources

An Efficient Configuration Methodology for Time-Division Multiplexed Single Resources An Eicient Coniguration Methodology or Time-Division Multiplexed Single Resources Benny Akesson 1, Anna Minaeva 1, Přemysl Šůcha 1, Andrew Nelson 2 and Zdeněk Hanzálek 1 1 Czech Technical University in

More information

ROBUST FACE DETECTION UNDER CHALLENGES OF ROTATION, POSE AND OCCLUSION

ROBUST FACE DETECTION UNDER CHALLENGES OF ROTATION, POSE AND OCCLUSION ROBUST FACE DETECTION UNDER CHALLENGES OF ROTATION, POSE AND OCCLUSION Phuong-Trinh Pham-Ngoc, Quang-Linh Huynh Department o Biomedical Engineering, Faculty o Applied Science, Hochiminh University o Technology,

More information

FRM: An Alternative Approach to Accurate Application Traffic Identification

FRM: An Alternative Approach to Accurate Application Traffic Identification FRM: An Alternative Approach to Accurate Application Traffic Identification Young J. Won 1, Myung-Sup Kim 2, James W. Hong 1 1 Dept. of Computer Science and Engineering, POSTECH {yjwon, jwkhong}@postech.ac.kr

More information

Classifier Evasion: Models and Open Problems

Classifier Evasion: Models and Open Problems . In Privacy and Security Issues in Data Mining and Machine Learning, eds. C. Dimitrakakis, et al. Springer, July 2011, pp. 92-98. Classiier Evasion: Models and Open Problems Blaine Nelson 1, Benjamin

More information

Reflection and Refraction

Reflection and Refraction Relection and Reraction Object To determine ocal lengths o lenses and mirrors and to determine the index o reraction o glass. Apparatus Lenses, optical bench, mirrors, light source, screen, plastic or

More information

A Hierarchical Quality-Dependent Approach Toward Establishing A Seamless Nationwide Topographic Database

A Hierarchical Quality-Dependent Approach Toward Establishing A Seamless Nationwide Topographic Database A Hierarchical Quality-Dependent Approach Toward Establishing A Seamless Nationwide Topographic Database Sagi Dalyot, Arieal Gershkovich, Yerach Doytsher Mapping and Geo-Inormation Engineering Technion,

More information

A Proposed Approach for Solving Rough Bi-Level. Programming Problems by Genetic Algorithm

A Proposed Approach for Solving Rough Bi-Level. Programming Problems by Genetic Algorithm Int J Contemp Math Sciences, Vol 6, 0, no 0, 45 465 A Proposed Approach or Solving Rough Bi-Level Programming Problems by Genetic Algorithm M S Osman Department o Basic Science, Higher Technological Institute

More information

A Large Scale Simulation Study: Impact of Unresponsive Malicious Flows

A Large Scale Simulation Study: Impact of Unresponsive Malicious Flows A Large Scale Simulation Study: Impact of Unresponsive Malicious Flows Yen-Hung Hu, Debra Tang, Hyeong-Ah Choi 3 Abstract Researches have unveiled that about % of current Internet traffic is contributed

More information

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class Computer Network Homework#3 COMPUTER NETWORK Homework #3 Due Date: May 22, 2017 in class Question 1 Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes

More information

2 J. Karvo et al. / Blocking of dynamic multicast connections Figure 1. Point to point (top) vs. point to multipoint, or multicast connections (bottom

2 J. Karvo et al. / Blocking of dynamic multicast connections Figure 1. Point to point (top) vs. point to multipoint, or multicast connections (bottom Telecommunication Systems 0 (1998)?? 1 Blocking of dynamic multicast connections Jouni Karvo a;, Jorma Virtamo b, Samuli Aalto b and Olli Martikainen a a Helsinki University of Technology, Laboratory of

More information

THE FINANCIAL CALCULATOR

THE FINANCIAL CALCULATOR Starter Kit CHAPTER 3 Stalla Seminars THE FINANCIAL CALCULATOR In accordance with the AIMR calculator policy in eect at the time o this writing, CFA candidates are permitted to use one o two approved calculators

More information

TCP and Congestion Control (Day 1) Yoshifumi Nishida Sony Computer Science Labs, Inc. Today's Lecture

TCP and Congestion Control (Day 1) Yoshifumi Nishida Sony Computer Science Labs, Inc. Today's Lecture TCP and Congestion Control (Day 1) Yoshifumi Nishida nishida@csl.sony.co.jp Sony Computer Science Labs, Inc 1 Today's Lecture Part1: TCP concept Part2: TCP detailed mechanisms Part3: Tools for TCP 2 1

More information

An Approach for Performance Evaluation of Batch-sequential and Parallel Architectural Styles

An Approach for Performance Evaluation of Batch-sequential and Parallel Architectural Styles An Approach or Perormance Evaluation o Batch-sequential and Parallel Architectural Styles Golnaz Aghaee Ghazvini MSc student, Young Research Club, Njaabad Branch, Esahan, Iran Aghaee.golnaz@sco.iaun.ac.ir

More information

The aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are

The aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are The aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are important requirements for developing programs that

More information

MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM

MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM UDC 681.3.06 MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM V.K. Pogrebnoy TPU Institute «Cybernetic centre» E-mail: vk@ad.cctpu.edu.ru Matrix algorithm o solving graph cutting problem has been suggested.

More information

Communication Networks Simulation of Communication Networks

Communication Networks Simulation of Communication Networks Communication Networks Simulation of Communication Networks Silvia Krug 01.02.2016 Contents 1 Motivation 2 Definition 3 Simulation Environments 4 Simulation 5 Tool Examples Motivation So far: Different

More information

Architectural Principles of the Internet

Architectural Principles of the Internet TLEN7000/ECEN7002: Analytical Foundations of Networks Architectural Principles of the Internet Lijun Chen 11/27/2012 The Internet Protocol Stack TCP/IP was first proposed in 1973 The specifications are

More information

A Method of Sign Language Gesture Recognition Based on Contour Feature

A Method of Sign Language Gesture Recognition Based on Contour Feature Proceedings o the World Congress on Engineering and Computer Science 014 Vol I WCECS 014, -4 October, 014, San Francisco, USA A Method o Sign Language Gesture Recognition Based on Contour Feature Jingzhong

More information

Nfsight Ne*low- based Network Awareness Tool

Nfsight Ne*low- based Network Awareness Tool LISA 10 Nov 7-12, 2010 San Jose, CA Nfsight Ne*low- based Network Awareness Tool Robin Berthier (University of Illinois at Urbana- Champaign) Michel Cukier (University of Maryland) Ma3 Hiltunen (AT&T Research)

More information

BitTorrent Traffic Classification

BitTorrent Traffic Classification BitTorrent Traffic Classification Atwin O. Calchand, Van T. Dinh, Philip Branch, Jason But Centre for Advanced Internet Architectures, Technical Report 090227A Swinburne University of Technology Melbourne,

More information

A Whirlwind Introduction to the Internet Overview

A Whirlwind Introduction to the Internet Overview Overview What s the Internet What s a protocol? Network edge Network core ccess nets, media Performance: loss, delay Protocol layers, service models ackbones, NPs, ISPs local ISP company regional ISP queuing

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE 333: Introduction to Communication Networks Fall 2001 Lecture 28: Transport Layer III Congestion control (TCP) 1 In the last lecture we introduced the topics of flow control and congestion control.

More information

Empirical Models of TCP and UDP End User Network Traffic from Data Analysis

Empirical Models of TCP and UDP End User Network Traffic from Data Analysis Empirical Models of TCP and UDP End User Network Traffic from NETI@home Data Analysis Charles R. Simpson, Jr., Dheeraj Reddy, George F. Riley School of Electrical and Computer Engineering Georgia Institute

More information

MAPI Computer Vision. Multiple View Geometry

MAPI Computer Vision. Multiple View Geometry MAPI Computer Vision Multiple View Geometry Geometry o Multiple Views 2- and 3- view geometry p p Kpˆ [ K R t]p Geometry o Multiple Views 2- and 3- view geometry Epipolar Geometry The epipolar geometry

More information

PATH PLANNING OF UNMANNED AERIAL VEHICLE USING DUBINS GEOMETRY WITH AN OBSTACLE

PATH PLANNING OF UNMANNED AERIAL VEHICLE USING DUBINS GEOMETRY WITH AN OBSTACLE Proceeding o International Conerence On Research, Implementation And Education O Mathematics And Sciences 2015, Yogyakarta State University, 17-19 May 2015 PATH PLANNING OF UNMANNED AERIAL VEHICLE USING

More information

Experimental Extensions to RSVP Remote Client and One-Pass Signalling

Experimental Extensions to RSVP Remote Client and One-Pass Signalling 1 Experimental Extensions to RSVP Remote Client and One-Pass Signalling Industrial Process and System Communications, Darmstadt University of Technology Merckstr. 25 D-64283 Darmstadt Germany Martin.Karsten@KOM.tu-darmstadt.de

More information

Defects Detection of Billet Surface Using Optimized Gabor Filters

Defects Detection of Billet Surface Using Optimized Gabor Filters Proceedings o the 7th World Congress The International Federation o Automatic Control Deects Detection o Billet Surace Using Optimized Gabor Filters Jong Pil Yun* SungHoo Choi* Boyeul Seo* Chang Hyun Park*

More information

A Bandwidth-Broker Based Inter-Domain SLA Negotiation

A Bandwidth-Broker Based Inter-Domain SLA Negotiation A Bandwidth-Broker Based Inter-Domain SLA Negotiation Haci A. Mantar θ, Ibrahim T. Okumus, Junseok Hwang +, Steve Chapin β θ Department of Computer Engineering, Gebze Institute of Technology, Turkey β

More information

Game Traffic Analysis: An MMORPG Perspective

Game Traffic Analysis: An MMORPG Perspective Appeared in ACM NOSSDAV 2005 (15th International Workshop on Network and Operating System Support for Digital Audio and Video) Game Traffic Analysis: An MMORPG Perspective (MMORPG: Massive Multiplayer

More information

Section II. Nios II Software Development

Section II. Nios II Software Development Section II. Nios II Sotware Development This section o the Embedded Design Handbook describes how to most eectively use the Altera tools or embedded system sotware development, and recommends design styles

More information

7. High-Speed Differential Interfaces in the Cyclone III Device Family

7. High-Speed Differential Interfaces in the Cyclone III Device Family December 2011 CIII51008-4.0 7. High-Speed Dierential Interaces in the Cyclone III Device Family CIII51008-4.0 This chapter describes the high-speed dierential I/O eatures and resources in the Cyclone III

More information

RD-TCP: Reorder Detecting TCP

RD-TCP: Reorder Detecting TCP RD-TCP: Reorder Detecting TCP Arjuna Sathiaseelan and Tomasz Radzik Department of Computer Science, King s College London, Strand, London WC2R 2LS {arjuna,radzik}@dcs.kcl.ac.uk Abstract. Numerous studies

More information

GENERATION OF DEM WITH SUB-METRIC VERTICAL ACCURACY FROM 30 ERS-ENVISAT PAIRS

GENERATION OF DEM WITH SUB-METRIC VERTICAL ACCURACY FROM 30 ERS-ENVISAT PAIRS GEERATIO OF DEM WITH SUB-METRIC VERTICAL ACCURACY FROM 30 ERS-EVISAT PAIRS C. Colesanti (), F. De Zan (), A. Ferretti (), C. Prati (), F. Rocca () () Dipartimento di Elettronica e Inormazione, Politecnico

More information

Bittorrent traffic classification

Bittorrent traffic classification Bittorrent traffic classification Tung M Le 1, Jason But Centre for Advanced Internet Architectures. Technical Report 091022A Swinburne University of Technology Melbourne, Australia jbut@swin.edu.au Abstract-

More information

Appendix B. Standards-Track TCP Evaluation

Appendix B. Standards-Track TCP Evaluation 215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error

More information

An Automatic Sequential Smoothing Method for Processing Biomechanical Kinematic Signals

An Automatic Sequential Smoothing Method for Processing Biomechanical Kinematic Signals An Automatic Sequential Smoothing Method or Processing Biomechanical Kinematic Signals F.J. ALONSO, F. ROMERO, D.R. SALGADO Department o Mechanical, Energetic and Material Engineering University o Extremadura

More information

A Research on Moving Human Body Detection Based on the Depth Images of Kinect

A Research on Moving Human Body Detection Based on the Depth Images of Kinect Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com A Research on Moving Human Body Detection Based on the Depth Images o Kinect * Xi an Zhu, Jiaqi Huo Institute o Inormation

More information

Application Presence Fingerprinting for NAT-Aware Router

Application Presence Fingerprinting for NAT-Aware Router Application Presence Fingerprinting for NAT-Aware Router Jun Bi, Lei Zhao, and Miao Zhang Network Research Center, Tsinghua University Beijing, P.R. China, 100084 junbi@cernet.edu.cn Abstract. NAT-aware

More information