ATCM: A Novel Agent-based Peer-to-Peer Traffic Control Management

Size: px
Start display at page:

Download "ATCM: A Novel Agent-based Peer-to-Peer Traffic Control Management"

Transcription

1 Journal of Computational Information Systems 7: 7 (2011) Available at ATCM: A Novel Agent-based Peer-to-Peer Traffic Control Management He XU 1,, Suoping WANG 2, Ruchuan WANG 1, Min WU 1 1 College of Computer, Nanjing University of Posts and Telecommunications, Nanjing , China 2 College of Automation, Nanjing University of Posts and Telecommunications, Nanjing , China Abstract This paper presents a novel Agent-based peer-to-peer (P2P) Traffic Control Management mechanism (ATCM), which provides a new way for P2P traffic control and management. The realized control system s database records are transferred into XML documents forms, and the Java language and Aglet platform are used for development of mobile agent. Experimental results show that the control system can control the P2P traffic effectively, save network bandwidth, and ensure quality of service (QoS) of other critical business. Keywords: P2P; Traffic Control; Agent; Traffic Management 1. Introduction With the rapid development of Internet, P2P (Peer-to-Peer) technology has become very popular. It is used in many areas including file sharing, instant messaging, search engines, collaborative computing, and distributed computing. Comparing with the traditional centralized client/server (C/S) model, P2P has weakened the concept of the server. The P2P system no longer distinguishes the role of server and client relations of various nodes. Each node can be a server but also a client. In the P2P network, nodes can directly exchange resources and services without going through the central server. In a variety of P2P applications, P2P file sharing system has been occupied the largest proportion traffic of network bandwidth. Because P2P technology has been rapid spread and development, and it becomes the largest consumer of network resources more than the previous Web, , FTP and other data traffic, and becomes the main burden of the network, or even causes network congestion, impacting and reducing the performance of other businesses. According to the related statistics, P2P flow accounted for 70% of the total Internet traffic throughputs [1]. This paper studies the existing P2P traffic detection technology, an agent-based P2P traffic control model and method are proposed, and the experiment results show that the proposed model and method are availability and effective. Related work. In order to control P2P network traffic more reasonably, the first step is to identify the P2P traffic. Various solutions have been developed for P2P traffic classification in recent years. A popular Corresponding author. addresses: xuhe2046@126.com (He XU) / Copyright 2011 Binary Information Press July, 2011

2 2308 H. Xu et al. /Journal of Computational Information Systems 7:7 (2011) approach is the TCP port based analysis where tools such as Netflow[2] and cflowd[3] are configured to read the service port numbers in the TCP/UDP packet headers, and compare them with the known(default) port numbers of the P2P applications. Then the packets are classified as P2P traffic if a match occurs. Although P2P applications have default port numbers, newer P2P versions allow the user to change the port numbers, or choose a random port number within a specified range. Hence, port based analysis becomes inefficient and misleading. A method using application signatures was developed by S. Sen, O. Spatscheck, and D. Wang in [4], noticing the fact that internet applications have a unique string(signature) located in the data portion of the packet(payload). They used the available information in the proprietary P2P protocol specifications in conjunction with information extracted from packet-level trace analysis to identify the signatures, and classify the packets accordingly. In this case, the traffic that passes through the network is monitored and the data payload of the packets is inspected according to some previously defined application signatures. This approach has been shown to work very well for Internet traffic including P2P applications [5-6]. Nowadays, many researchers turn their attentions to machine learning based approaches for P2P traffic classification, in general it can be divided into two categories: Clustering Approaches, in which EM[7], AutoClass[8], K-Means[1,9] are typical ones; and Supervised Learning, in which naive Bayes[10 13], Bayesian Neural Network[14], Decision Tree[11] are most widely employed. In these researches the statistical characteristics of IP flows are concerned. Flow statistics, such as volume, duration and packet size, are extracted from the network data to establish the feature set. Traffic behavior analysis is another technique which passively checks the network packets and matches them with the pre-defined P2P traffic characteristics. Authors in [15] design a P2P traffic detection framework INFOPAD(Integrated Framework of P2P Traffic Detection) over large scale NetFlow data, which is based on traffic behavior analysis. This paper presents an efficient agent-based traffic control management scheme (ATCM) for P2P traffic to be controlled, which provides a new way for P2P traffic control and management. The system s database records are transferred into XML documents forms, and the Java language and Aglet platform are used for development of mobile agent. Experimental results show that the control system can control the P2P traffic effectively, save network bandwidth, and ensure QoS of other critical business. 2. ATCM: Agent based P2P Traffic Control Model Agent-based traffic control management model (ATCM) for P2P traffic Control is shown in Figure 1, which includes the Manager agent (MA), system information database, P2P flow monitor, information database, trace agent, traffic information collect agent, traffic control agent and agent run environment components. Agent-based computing is an effective paradigm for developing applications in complex domains as it supports the design and implementation of applications in terms of autonomous software entities, or Agents, which can achieve their goals flexibly by interacting with each another through high-level protocols and languages. Agents can also be endowed with a mobility feature which enables them to roam across the network, thus potentially saving network resources, improving performance, and enabling dynamic reconfigurability [16]. Architectures, protocols, and languages for Agents have been subjected to standardization by the Foundation for Intelligent and Physical Agents (FIPA) in response to

3 H. Xu et al. /Journal of Computational Information Systems 7:7 (2011) the interest of telecommunication companies for applying Agents for the intelligent management of networks [17]. Fig.1 Agent-based P2P Traffic Control Model (1) Manager Agent (MA): MA exchanges information with traffic information collect agent and determines whether to limit P2P traffic, if the traffic needs to be restricted then traffic control agent run P2P traffic control procedures. MA manages trace agent and system information database, and provides interfaces between system and network administrator. MA accumulates and assesses the information from the collect agent sent to collect all the information, if the P2P traffic flow information exceeds a certain preset value, MA will notify the traffic control agent to implement P2P traffic control. MA may reside on switch device in each local network. (2) P2P Flow Monitor: Monitor exists in each local network. Through monitoring each network s switch or routing device, it will find whether P2P traffic is existed in the network, and the monitoring results will be reported to MA. The method of P2P traffic identification can be used by the P2P traffic detection technology which is introduced in the section I s related work. (3) Traffic Information Collect Agent: It is mobile, and collects the target network with a variety of P2P-related information (such as IP, communicating port, the use of P2P protocols, etc.), and the results will be returned to MA. (4) System Information Database and Information Database: System information database is located in MA machine, which is used to collect and record all the information from the network, and will track each routing integrate all information of P2P connection. Information database is located in P2P traffic monitor for storing P2P control operation s log. (5) Trace Agent: After P2P traffic monitor device detects P2P traffic, P2P traffic monitor will release trace agent to track the location of each node in the network, and interact with the traffic control agent information in order to facilitate to implementation of the P2P flow control.

4 2310 H. Xu et al. /Journal of Computational Information Systems 7:7 (2011) (6) Traffic Control Agent: Traffic control agent implements specific control strategies, such as restriction of the total P2P traffic, P2P flow rate, based on time stamp, etc, to ensure the QoS of all services in the management network. Fig. 2 P2P Traffic Control Flow Chart Figure 2 is the flow chart of mobile agent-based P2P flow control model. The P2P flow control process is as follows: Step 1. P2P Traffic Monitor opens monitor and detects each data link connection whether it is a P2P connection. Detection method is based on the previous section I which introduces the P2P traffic detection technology. Step 2. If it is the P2P connection, the P2P Traffic Monitor recognizes the connection information of the node (such as IP, communication port and other information) and puts the information into the database, and generates traffic information collection agent, and also transmits this information to MA. Step 3. Based on current network conditions, MA tracks and controls this P2P connection. If the connection does not been tracking then it will be released. If tracking then MA creates trace agent, and puts this connection information to the P2P flow control table, and notifies P2P traffic monitor to run real-time monitoring and controlling. Step 4. After P2P flow monitor receives MA notification information, P2P flow monitor real-time statistics P2P flow information and stores those information into the database, and makes a judge, when more than the limited value and it will notify the flow control agent, then closes this P2P connection, and transmits the related operation information and data to notify P2P traffic information collection agent.

5 H. Xu et al. /Journal of Computational Information Systems 7:7 (2011) Key Technology of ATCM Implementation ATCM uses Jpcap packet capture to analysis data, the Java language and Aglet to design Mobile Agent, and uses XML data access technology to store data Real-time Traffic Data Capture Technology P2P traffic monitor data capture module is the core of the implementation, and it is implemented by using Jpcap [18]. Jpcap is able to crawl and send a network packet by Java components, which can be used through a network interface to send any packets. Jpcap can capture Ethernet, IPv4, IPv6, ARP / RARP, TCP, UDP and ICMPv4 packets. Jpcap call wincap/libcap, and the Java language provides a common interface to achieve the platform independence Secure Mobile Agent Technology Aglet is a pure Java development with IBM for the mobile agent development technology, and provide a practical platform-- Aglet Workbench [19], allow people to develop or implement mobile agent system. It provides a simple and comprehensive programming model for mobile agent, and agent provides a dynamic and effective communication mechanism. It also provides a context to manage Aglet basic behaviors: such as create Aglet, copy or distribute Aglet to the destination machine, recall remote Aglet, suspend or wake Aglet, and remove Aglet and so on. These characteristics meet our proposed ATCM to achieve functional requirements. We use Java language and Aglet to implement mobile agent XML-based Database Access Technology System Information Database and Information Database need support layer for database, in order to be to effectively integrate with Java and the all solution of ATCM, we use XML-based database [20]. The advantage of using XML technology is that the data is exchangeability, and it has the following advantages of data applications: (1) XML file is a pure text file, no operating system and software platform restrictions; (2) XML is based on Schema, which is easy to describe the semantics of data, while the description can be understood and automatic processing by computer; (3) XML can describe structured, semi-structured and unstructured data. Figure 3 is the experimental network topology of the P2P traffic monitor system which is implemented according to the P2P flow control model. In the topology, Peer A and Peer B, Peer C and Peer D are belonging to a different network segment. In the experiment, Peer A and Peer C use P2P software (such as BitTorrent, emule, etc.) to download the same video compression package files, while Peer B and Peer D use FTP downloads and Web access operation simultaneously; P2P traffic monitoring server A opens monitoring, and P2P traffic monitoring server B closes monitoring. Deep Packet Inspection (DPI) technology [21] is used in the experiment on the P2P traffic information statistic. Experiment compares the download traffic of the router R1 and router R2, and the download rate of Peer A and Peer C. Performance results are shown in Figure 4 and Figure 5.

6 2312 H. Xu et al. /Journal of Computational Information Systems 7:7 (2011) Experimental Results and Discussions As can be seen from Figure 4, the growth of download traffic of Router 1 which opens the P2P flow control is smaller than that of Router 2 which without open P2P flow control; As also can be seen from Figure 5, the download rate of Peer A is smaller than that of Peer C, because in the beginning 3 minutes of the start download time, while P2P clients stay in the stage of finding resources, the download rate of Peer A and Peer C are little difference, with the P2P client to find a lot of resources, after 3 minutes later, the download rate of the Peer C increases rapidly in the segment of not opening P2P flow control, and he download rate of the Peer A did not change significantly because it locates in the segment of opening P2P flow control. Fig. 3 Network Topology Fig. 4 Routers Download Traffic Fig.5 Peers Download Rate Experimental results show that the mobile agent based P2P traffic control system can achieve the purpose of controlling P2P traffic, make a lot of P2P traffic bandwidth down, ensure that other applications traffic would be enhanced, and so as to effectively guarantee quality of service (QoS) of other network applications.

7 H. Xu et al. /Journal of Computational Information Systems 7:7 (2011) Conclusions and Future Work This paper presents an efficient agent-based traffic control management mechanism (ATCM) for P2P traffic, which uses mobile agent s mobility, autonomy and intelligence, etc. Our scheme provides a new way for P2P traffic control and management. In the system s implementation, the database records is transferred into XML documents forms, and the Java language and Aglet platform are used for development of mobile agent. Experimental results show that the control system can control the P2P traffic effectively, improve the flow distribution in P2P network, save network bandwidth, and ensure quality of service of other critical business. As a result, ATCM eliminates the complexity of the original flow control, achieves a better control of P2P traffic, and the scheme is easy to be deployed in the Internet environment. However, because of P2P protocol s multiplicity, it is difficult to identification P2P traffic, thus how to detection P2P flow are the main work to do in the future work. Acknowledgement The subject is sponsored by the National Natural Science Foundation of P. R. China ( ) Scientific & Technological Support Project (Industry) of Jiangsu Province (No. BE ,BE ) The Special Foundation for Development of Modern Service Industry of Jiangsu Province Project sponsored by Jiangsu provincial research scheme of natural science for higher education institutions (10KJB KJB520014) Scientific Research & Industry Promotion Project for Higher Education Institutions(JH10-14) Postdoctoral Foundation ( B) Science & Technology Innovation Fund for higher education institutions of Jiangsu Province (CX10B-196Z,CX10B-197Z,CX10B-198Z,CX10B-199Z,CX10B-200Z) the six kinds of Top Talent of Jiangsu Province ( ) Doctoral Fund of Ministry of Education of China ( ) and key Laboratory Foundation of Information Technology processing of Jiangsu Province (KJS1022). The authors would like to thank the editor and the anonymous reviewers, who provide insightful and constructive comments for improving this paper. References [1] J. Erman, A. Mahanti, M. Arlitt, et al. Identifying and discriminating between web and peer-to-peer traffic in the network core. Proceedings of the 16th international conference on World Wide Web(WWW 2007), pages , [2] S. Kamei and T. Kimura. Cisco IOS NetFlow Overview. Whitepaper, available at Cisco Systems Inc [3] M. Crovella and B. Krishnamurthy. Internet measurement: infrastructure, traffic and applications. John Wiley and Sons Ltd.West Sussex, England, [4] S. Sen, O. Spatscheck, and D. Wang. Accurate, Scalable In Network Identification of P2P Traffic using Application Signatures. Proceedings of the 13th International World Wide Web Conference, pages , [5] P. Haffner, S. Sen, O. Spatscheck, and D. Wang. Acas:Automated construction of application signatures. In Proceedings of the SIGCOMM05 Workshops, [6] T. Karagiannis, A. Broido, M. Faloutsos and K. Claffy. Transport layer identification of P2P traffic. In Proceedings of the ACM SIGCOMM Internet Measurement Conference, pages , [7] A. McGregor, M. Hall, P. Lorier, et al. Flow clustering using machine learning techniques. In PAM Antibes Juan-les-Pins, France, April, [8] A. Zander, T. Nguyen, G. Armitage. Automated traffic classification and application identification using machine learning. In LCN 2005, Sydney, Australia, pages , [9] L. Bernaille, R. Teixeira, I. Akodkenou. Traffic classification on the fly. ACM SIGCOMM Comput Commun

8 2314 H. Xu et al. /Journal of Computational Information Systems 7:7 (2011) Review, 36(2): 23-26, [10] A. W. Moore, D. Zuev. Internet traffic classification using Bayesian analysis techniques. In ACM SIGMETRICS 2005, pages 50-60, [11] J. Park, H. R. Tyan, C. Kuo. Internet traffic classification for scalable QoS provision. In 2006 IEEE International Conference on Multimedia and Expo. Toronto, Ontario, Canada, pages , [12] T. Nguyen, G. Armitage. Training on multiple sub-flows to optimize the use of Machine Learning classifiers in real-world IP networks. In LCN 2006, Tampa, Florida,USA, pages , [13] D. Bonfiglio, M. Mellia, M. Meo, et al. Revealing Skype traffic: when randomness plays with you. In SIGCOMM 07. New York, NY, USA, August. pages 37-38, [14] T. Auld, A. W. Moore, S. F. Gull. Bayesian neural networks for Internet traffic classification. IEEE Trans Neural Netw, 18(1): , [15] R. Zhang, J. Chang, H. Zhou, et al. P2P traffic detection on large scale netflow data. Journal of Computational Information Systems, 4(2): , [16] M. Luck, P. McBurney, C. Preist, A manifesto for agent technology: Towards next generation computing. Autonomous Agents and Multi-Agent Systems, 9 (3): , [17] G. Fortino, W. Russo. Using P2P, GRID and Agent technologies for the development of content distribution networks. Future Generation Computer Systems, 24: , [18] Z. H. Shen, H. Wang. Network Data Packet Capture and Protocol Analysis on Jpcap-Based. Proceedings of the 2009 International Conference on Information Management, Innovation Management and Industrial Engineering, USA: IEEE COMPUTER SOC, 3: , [19] D. B. Lange, D. T. Chang. IBM Aglets Workbench Programming Mobile Agents in Java. White Paper, Japan: IBM Corporation, [20] B. Mclaughlin. Java & XML, 2nd Edition. O'Reilly Media, Inc., [21] S. Sen, J. Wang. Analyzing Peer-to-Peer Traffic Across Large Networks. IEEE/ACM Transactions on Networking, 12(2): , 2004.

Encrypted Internet Traffic Classification Method based on Host Behavior

Encrypted Internet Traffic Classification Method based on Host Behavior Encrypted Internet Traffic Classification Method based on Host Behavior 1,* Chengjie GU, 1 Shunyi ZHANG, 2 Xiaozhen XUE 1 Institute of Information Network Technology, Nanjing University of Posts and Telecommunications,

More information

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab

More information

Using UDP Packets to Detect P2P File Sharing

Using UDP Packets to Detect P2P File Sharing 188 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 27 Using UDP Packets to Detect P2P File Sharing Tsang-Long Pao and Jian-Bo Chen Tatung University, Taipei,

More information

Traffic Classification with Sampled NetFlow

Traffic Classification with Sampled NetFlow Traffic Classification with Sampled NetFlow Valentín Carela-Español, Pere Barlet-Ros, Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {vcarela,pbarlet,pareta}@ac.upc.edu Abstract The traffic

More information

Research on Errors of Utilized Bandwidth Measured by NetFlow

Research on Errors of Utilized Bandwidth Measured by NetFlow Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic

More information

How To Classify Network Traffic In Real Time

How To Classify Network Traffic In Real Time 22 Approaching Real-time Network Traffic Classification ISSN 1470-5559 Wei Li, Kaysar Abdin, Robert Dann and Andrew Moore RR-06-12 October 2006 Department of Computer Science Approaching Real-time Network

More information

Traffic Analysis of Mobile Broadband Networks

Traffic Analysis of Mobile Broadband Networks Traffic Analysis of Mobile Broadband Networks Geza Szabo,Daniel Orincsay,Balazs Peter Gero,Sandor Gyori,Tamas Borsos TrafficLab, Ericsson Research, Budapest, Hungary Email:{geza.szabo,daniel.orincsay,

More information

Forensic Network Traffic Analysis

Forensic Network Traffic Analysis Forensic Network Traffic Analysis Noora Al Khater Department of Informatics King's College London London, United Kingdom noora.al_khater@kcl.ac.uk Richard E Overill Department of Informatics King's College

More information

An apparatus for P2P classification in Netflow traces

An apparatus for P2P classification in Netflow traces An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA

More information

Near Real Time Online Flow-based Internet Traffic Classification Using Machine Learning (C4.5)

Near Real Time Online Flow-based Internet Traffic Classification Using Machine Learning (C4.5) Near Real Time Online Flow-based Internet Traffic Classification Using Machine Learning (C4.5) Abuagla Babiker Mohammed Faculty of Electrical Engineering (FKE) Deprtment of Microelectronics and Computer

More information

Research on Video Traffic Control Technology Based on SDN. Ziyan Lin

Research on Video Traffic Control Technology Based on SDN. Ziyan Lin Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) Research on Video Traffic Control Technology Based on SDN Ziyan Lin Communication University of China, Beijing

More information

Peer to peer networking: Main aspects and conclusions from the view of Internet service providers

Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Gerhard Haßlinger, Department of Computer Science, Darmstadt University of Technology, Germany Abstract:

More information

A Scheme for Implementing Load Balancing of Web Server

A Scheme for Implementing Load Balancing of Web Server Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public

More information

Network congestion control using NetFlow

Network congestion control using NetFlow Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.

More information

HMC: A Novel Mechanism for Identifying Encrypted P2P Thunder Traffic

HMC: A Novel Mechanism for Identifying Encrypted P2P Thunder Traffic HMC: A Novel Mechanism for Identifying Encrypted P2P Thunder Traffic Chenglong Li* and Yibo Xue Department of Computer Science & Techlogy, Research Institute of Information Techlogy (RIIT), Tsinghua University,

More information

Packet Flow Analysis and Congestion Control of Big Data by Hadoop

Packet Flow Analysis and Congestion Control of Big Data by Hadoop Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.456

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

Lecture 28: Internet Protocols

Lecture 28: Internet Protocols Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further

More information

A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification

A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification Riyad Alshammari and A. Nur Zincir-Heywood Dalhousie University, Faculty of Computer Science {riyad, zincir}@cs.dal.ca

More information

Classifying P2P Activity in Netflow Records: A Case Study on BitTorrent

Classifying P2P Activity in Netflow Records: A Case Study on BitTorrent IEEE ICC 2013 - Communication Software and Services Symposium 1 Classifying P2P Activity in Netflow Records: A Case Study on BitTorrent Ahmed Bashir 1, Changcheng Huang 1, Biswajit Nandy 2, Nabil Seddigh

More information

Online Classification of Network Flows

Online Classification of Network Flows 2009 Seventh Annual Communications Networks and Services Research Conference Online Classification of Network Flows Mahbod Tavallaee, Wei Lu and Ali A. Ghorbani Faculty of Computer Science, University

More information

Realtime Classification for Encrypted Traffic

Realtime Classification for Encrypted Traffic Realtime Classification for Encrypted Traffic Roni Bar-Yanai 1, Michael Langberg 2,, David Peleg 3,, and Liam Roditty 4 1 Cisco, Netanya, Israel rbaryana@cisco.com 2 Computer Science Division, Open University

More information

Hadoop Technology for Flow Analysis of the Internet Traffic

Hadoop Technology for Flow Analysis of the Internet Traffic Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet

More information

Classifying P2P Activities in Netflow Records: A Case Study (BitTorrnet & Skype) Ahmed Bashir

Classifying P2P Activities in Netflow Records: A Case Study (BitTorrnet & Skype) Ahmed Bashir Classifying P2P Activities in Netflow Records: A Case Study (BitTorrnet & Skype) by Ahmed Bashir A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial fulfillment of the requirements

More information

Aggregating Correlated Naive Predictions to Detect Network Traffic Intrusion

Aggregating Correlated Naive Predictions to Detect Network Traffic Intrusion Aggregating Correlated Naive Predictions to Detect Network Traffic Intrusion G.Vivek #1, B.Logesshwar #2, Civashritt.A.B #3, D.Ashok #4 UG Student, Department of Computer Science and Engineering, SRM University,

More information

Scalable Extraction, Aggregation, and Response to Network Intelligence

Scalable Extraction, Aggregation, and Response to Network Intelligence Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks

Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks 1 Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks Leonardo Ochoa-Aday, Cristina Cervello -Pastor, Member, IEEE, and Adriana Ferna ndez-ferna ndez Abstract The explosion

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management

More information

5 Applied Machine Learning Theory

5 Applied Machine Learning Theory 5 Applied Machine Learning Theory 5-1 Monitoring and Analysis of Network Traffic in P2P Environment BAN Tao, ANDO Ruo, and KADOBAYASHI Youki Recent statistical studies on telecommunication networks outline

More information

Question: 3 When using Application Intelligence, Server Time may be defined as.

Question: 3 When using Application Intelligence, Server Time may be defined as. 1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response

More information

Computer Networks & Security 2014/2015

Computer Networks & Security 2014/2015 Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!

More information

From Centralization to Distribution: A Comparison of File Sharing Protocols

From Centralization to Distribution: A Comparison of File Sharing Protocols From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

SPECIAL FEATURES OF TCP/IP NETWORK TRAFFIC AND PROBLEMS OF THE PROGRAM MONITORING. (1)Radi ROMANSKY

SPECIAL FEATURES OF TCP/IP NETWORK TRAFFIC AND PROBLEMS OF THE PROGRAM MONITORING. (1)Radi ROMANSKY 1 SPECIAL FEATURES OF TCP/IP NETWORK TRAFFIC AND PROBLEMS OF THE PROGRAM MONITORING (1)Radi ROMANSKY (1)Department of Computer Systems, Technical University Sofia e-mail address: rrom@tu-sofia.bg Bulgaria

More information

Industrial Communication Whitepaper. Principles of EtherNet/IP Communication

Industrial Communication Whitepaper. Principles of EtherNet/IP Communication Industrial Communication Whitepaper Principles of EtherNet/IP Communication 1 Contents Introduction...3 Producer/Consumer Model...4 EtherNet/IP Messaging Types...7 Real Time Data Exchanges...9 Typical

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

IPv6 First Hop Security Protecting Your IPv6 Access Network

IPv6 First Hop Security Protecting Your IPv6 Access Network IPv6 First Hop Security Protecting Your IPv6 Access Network What You Will Learn This paper provides a brief introduction to common security threats on IPv6 campus access networks and will explain the value

More information

Flow Analysis Versus Packet Analysis. What Should You Choose?

Flow Analysis Versus Packet Analysis. What Should You Choose? Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation

More information

Bandwidth Management Technology White Paper

Bandwidth Management Technology White Paper Bandwidth Management Technology White Paper Keyword: Bandwidth management, segment-based bandwidth management, user-based bandwidth management, service-based bandwidth management, connection-based bandwidth

More information

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET

More information

inet Enterprise Features Fact Sheet

inet Enterprise Features Fact Sheet 2007 inet Enterprise Features Fact Sheet inetmon Sdn. Bhd. 1010 & 1011, Tingkat 10 Blok D, Dataran Usahawan Kelana,17, Jalan SS 7/26, Kelana Jaya, 47301 Petaling Jaya, Selangor Darul Ehsan Tel: 603-7880

More information

Cover. White Paper. (nchronos 4.1)

Cover. White Paper. (nchronos 4.1) Cover White Paper (nchronos 4.1) Copyright Copyright 2013 Colasoft LLC. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

CMA5000 SPECIFICATIONS. 5710 Gigabit Ethernet Module

CMA5000 SPECIFICATIONS. 5710 Gigabit Ethernet Module CMA5000 5710 Gigabit Ethernet Module SPECIFICATIONS General Description The CMA5710 Gigabit Ethernet application is a single slot module that can be used in any CMA 5000. The Gigabit Ethernet test module

More information

A Network Simulation Experiment of WAN Based on OPNET

A Network Simulation Experiment of WAN Based on OPNET A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2

More information

Bandwidth Management for Peer-to-Peer Applications

Bandwidth Management for Peer-to-Peer Applications Overview Bandwidth Management for Peer-to-Peer Applications With the increasing proliferation of broadband, more and more users are using Peer-to-Peer (P2P) protocols to share very large files, including

More information

Network Traceability Technologies for Identifying Performance Degradation and Fault Locations for Dependable Networks

Network Traceability Technologies for Identifying Performance Degradation and Fault Locations for Dependable Networks Network Traceability Technologies for Identifying Performance Degradation and Fault Locations for SHIMONISHI Hideyuki, YAMASAKI Yasuhiro, MURASE Tsutomu, KIRIHA Yoshiaki Abstract This paper discusses the

More information

Identifying Peer-to-Peer Traffic Based on Traffic Characteristics

Identifying Peer-to-Peer Traffic Based on Traffic Characteristics Identifying Peer-to-Peer Traffic Based on Traffic Characteristics Prof S. R. Patil Dept. of Computer Engineering SIT, Savitribai Phule Pune University Lonavala, India srp.sit@sinhgad.edu Suraj Sanjay Dangat

More information

Internet Traffic Measurement

Internet Traffic Measurement Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software

More information

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems

A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands l.dacunto@tudelft.nl

More information

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University

More information

Experimentation driven traffic monitoring and engineering research

Experimentation driven traffic monitoring and engineering research Experimentation driven traffic monitoring and engineering research Amir KRIFA (Amir.Krifa@sophia.inria.fr) 11/20/09 ECODE FP7 Project 1 Outline i. Future directions of Internet traffic monitoring and engineering

More information

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

A Topology-Aware Relay Lookup Scheme for P2P VoIP System Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme

Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,

More information

Classifying Service Flows in the Encrypted Skype Traffic

Classifying Service Flows in the Encrypted Skype Traffic Classifying Service Flows in the Encrypted Skype Traffic Macie Korczyński and Andrze Duda Grenoble Institute of Technology CNRS Grenoble Informatics Laboratory UMR 5217 Grenoble France. Email: [macie.korczynski

More information

The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang

The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang Nanjing Communications

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

What is VLAN Routing?

What is VLAN Routing? Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

and reporting Slavko Gajin slavko.gajin@rcub.bg.ac.rs

and reporting Slavko Gajin slavko.gajin@rcub.bg.ac.rs ICmyNet.Flow: NetFlow based traffic investigation, analysis, and reporting Slavko Gajin slavko.gajin@rcub.bg.ac.rs AMRES Academic Network of Serbia RCUB - Belgrade University Computer Center ETF Faculty

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need

More information

A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming

A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming Chin Yong Goh 1,Hui Shyong Yeo 1, Hyotaek Lim 1 1 Dongseo University Busan, 617-716, South Korea cgnicky@gmail.com, hui_shyong@hotmail.com,

More information

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0 Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0 Abstract Avaya IP Softphone R3 V2.1 now supports H.323 VoIP applications running over different

More information

Protecting and controlling Virtual LANs by Linux router-firewall

Protecting and controlling Virtual LANs by Linux router-firewall Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia

More information

Signature-aware Traffic Monitoring with IPFIX 1

Signature-aware Traffic Monitoring with IPFIX 1 Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764

More information

Network Protocol Configuration

Network Protocol Configuration Table of Contents Table of Contents Chapter 1 Configuring IP Addressing... 1 1.1 IP Introduction... 1 1.1.1 IP... 1 1.1.2 IP Routing Protocol... 1 1.2 Configuring IP Address Task List... 2 1.3 Configuring

More information

Data Communication and Computer Network

Data Communication and Computer Network 1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

The Applications of Deep Learning on Traffic Identification

The Applications of Deep Learning on Traffic Identification The Applications of Deep Learning on Traffic Identification Zhanyi Wang wangzhanyi@360.cn Abstract Generally speaking, most systems of network traffic identification are based on features. The features

More information

Content-Aware Load Balancing using Direct Routing for VOD Streaming Service

Content-Aware Load Balancing using Direct Routing for VOD Streaming Service Content-Aware Load Balancing using Direct Routing for VOD Streaming Service Young-Hwan Woo, Jin-Wook Chung, Seok-soo Kim Dept. of Computer & Information System, Geo-chang Provincial College, Korea School

More information

HP IMC User Behavior Auditor

HP IMC User Behavior Auditor HP IMC User Behavior Auditor Administrator Guide Abstract This guide describes the User Behavior Auditor (UBA), an add-on service module of the HP Intelligent Management Center. UBA is designed for IMC

More information

LAN Switching and VLANs

LAN Switching and VLANs 26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access

More information

EXPLORER. TFT Filter CONFIGURATION

EXPLORER. TFT Filter CONFIGURATION EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

Research on Cloud Computing Network Architecture Based on SDN Technology Weibo Li

Research on Cloud Computing Network Architecture Based on SDN Technology Weibo Li 4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) Research on Cloud Computing Network Architecture Based on SDN Technology Weibo Li wuhan textile university, Wuhan,

More information

Software Defined Networking (SDN) - Open Flow

Software Defined Networking (SDN) - Open Flow Software Defined Networking (SDN) - Open Flow Introduction Current Internet: egalitarian routing/delivery based on destination address, best effort. Future Internet: criteria based traffic management,

More information

CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION

CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION MATIJA STEVANOVIC PhD Student JENS MYRUP PEDERSEN Associate Professor Department of Electronic Systems Aalborg University,

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

A Network Monitoring System with a Peer-to-Peer Architecture

A Network Monitoring System with a Peer-to-Peer Architecture A Network Monitoring System with a Peer-to-Peer Architecture Paulo Salvador, Rui Valadas University of Aveiro / Institute of Telecommunications Aveiro E-mail: salvador@av.it.pt; rv@det.ua.pt Abstract The

More information

Distributed Systems. 2. Application Layer

Distributed Systems. 2. Application Layer Distributed Systems 2. Application Layer Werner Nutt 1 Network Applications: Examples E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Social

More information

21.4 Network Address Translation (NAT) 21.4.1 NAT concept

21.4 Network Address Translation (NAT) 21.4.1 NAT concept 21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico di Torino Porto Institutional Repository [Proceeding] NEMICO: Mining network data through cloud-based data mining techniques Original Citation: Baralis E.; Cagliero L.; Cerquitelli T.; Chiusano

More information

QRadar Security Intelligence Platform Appliances

QRadar Security Intelligence Platform Appliances DATASHEET Total Security Intelligence An IBM Company QRadar Security Intelligence Platform Appliances QRadar Security Intelligence Platform appliances combine typically disparate network and security management

More information

Application of Internet Traffic Characterization to All-Optical Networks

Application of Internet Traffic Characterization to All-Optical Networks Application of Internet Traffic Characterization to All-Optical Networks Pedro M. Santiago del Río, Javier Ramos, Alfredo Salvador, Jorge E. López de Vergara, Javier Aracil, Senior Member IEEE* Antonio

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

Enlarge Bandwidth of Multimedia Server with Network Attached Storage System

Enlarge Bandwidth of Multimedia Server with Network Attached Storage System Enlarge Bandwidth of Multimedia Server with Network Attached Storage System Dan Feng, Yuhui Deng, Ke Zhou, Fang Wang Key Laboratory of Data Storage System, Ministry of Education College of Computer, Huazhong

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

P2P VoIP for Today s Premium Voice Service 1

P2P VoIP for Today s Premium Voice Service 1 1 P2P VoIP for Today s Premium Voice Service 1 Ayaskant Rath, Stevan Leiden, Yong Liu, Shivendra S. Panwar, Keith W. Ross ARath01@students.poly.edu, {YongLiu, Panwar, Ross}@poly.edu, Steve.Leiden@verizon.com

More information