ATCM: A Novel Agent-based Peer-to-Peer Traffic Control Management
|
|
- Alfred Harris
- 7 years ago
- Views:
Transcription
1 Journal of Computational Information Systems 7: 7 (2011) Available at ATCM: A Novel Agent-based Peer-to-Peer Traffic Control Management He XU 1,, Suoping WANG 2, Ruchuan WANG 1, Min WU 1 1 College of Computer, Nanjing University of Posts and Telecommunications, Nanjing , China 2 College of Automation, Nanjing University of Posts and Telecommunications, Nanjing , China Abstract This paper presents a novel Agent-based peer-to-peer (P2P) Traffic Control Management mechanism (ATCM), which provides a new way for P2P traffic control and management. The realized control system s database records are transferred into XML documents forms, and the Java language and Aglet platform are used for development of mobile agent. Experimental results show that the control system can control the P2P traffic effectively, save network bandwidth, and ensure quality of service (QoS) of other critical business. Keywords: P2P; Traffic Control; Agent; Traffic Management 1. Introduction With the rapid development of Internet, P2P (Peer-to-Peer) technology has become very popular. It is used in many areas including file sharing, instant messaging, search engines, collaborative computing, and distributed computing. Comparing with the traditional centralized client/server (C/S) model, P2P has weakened the concept of the server. The P2P system no longer distinguishes the role of server and client relations of various nodes. Each node can be a server but also a client. In the P2P network, nodes can directly exchange resources and services without going through the central server. In a variety of P2P applications, P2P file sharing system has been occupied the largest proportion traffic of network bandwidth. Because P2P technology has been rapid spread and development, and it becomes the largest consumer of network resources more than the previous Web, , FTP and other data traffic, and becomes the main burden of the network, or even causes network congestion, impacting and reducing the performance of other businesses. According to the related statistics, P2P flow accounted for 70% of the total Internet traffic throughputs [1]. This paper studies the existing P2P traffic detection technology, an agent-based P2P traffic control model and method are proposed, and the experiment results show that the proposed model and method are availability and effective. Related work. In order to control P2P network traffic more reasonably, the first step is to identify the P2P traffic. Various solutions have been developed for P2P traffic classification in recent years. A popular Corresponding author. addresses: xuhe2046@126.com (He XU) / Copyright 2011 Binary Information Press July, 2011
2 2308 H. Xu et al. /Journal of Computational Information Systems 7:7 (2011) approach is the TCP port based analysis where tools such as Netflow[2] and cflowd[3] are configured to read the service port numbers in the TCP/UDP packet headers, and compare them with the known(default) port numbers of the P2P applications. Then the packets are classified as P2P traffic if a match occurs. Although P2P applications have default port numbers, newer P2P versions allow the user to change the port numbers, or choose a random port number within a specified range. Hence, port based analysis becomes inefficient and misleading. A method using application signatures was developed by S. Sen, O. Spatscheck, and D. Wang in [4], noticing the fact that internet applications have a unique string(signature) located in the data portion of the packet(payload). They used the available information in the proprietary P2P protocol specifications in conjunction with information extracted from packet-level trace analysis to identify the signatures, and classify the packets accordingly. In this case, the traffic that passes through the network is monitored and the data payload of the packets is inspected according to some previously defined application signatures. This approach has been shown to work very well for Internet traffic including P2P applications [5-6]. Nowadays, many researchers turn their attentions to machine learning based approaches for P2P traffic classification, in general it can be divided into two categories: Clustering Approaches, in which EM[7], AutoClass[8], K-Means[1,9] are typical ones; and Supervised Learning, in which naive Bayes[10 13], Bayesian Neural Network[14], Decision Tree[11] are most widely employed. In these researches the statistical characteristics of IP flows are concerned. Flow statistics, such as volume, duration and packet size, are extracted from the network data to establish the feature set. Traffic behavior analysis is another technique which passively checks the network packets and matches them with the pre-defined P2P traffic characteristics. Authors in [15] design a P2P traffic detection framework INFOPAD(Integrated Framework of P2P Traffic Detection) over large scale NetFlow data, which is based on traffic behavior analysis. This paper presents an efficient agent-based traffic control management scheme (ATCM) for P2P traffic to be controlled, which provides a new way for P2P traffic control and management. The system s database records are transferred into XML documents forms, and the Java language and Aglet platform are used for development of mobile agent. Experimental results show that the control system can control the P2P traffic effectively, save network bandwidth, and ensure QoS of other critical business. 2. ATCM: Agent based P2P Traffic Control Model Agent-based traffic control management model (ATCM) for P2P traffic Control is shown in Figure 1, which includes the Manager agent (MA), system information database, P2P flow monitor, information database, trace agent, traffic information collect agent, traffic control agent and agent run environment components. Agent-based computing is an effective paradigm for developing applications in complex domains as it supports the design and implementation of applications in terms of autonomous software entities, or Agents, which can achieve their goals flexibly by interacting with each another through high-level protocols and languages. Agents can also be endowed with a mobility feature which enables them to roam across the network, thus potentially saving network resources, improving performance, and enabling dynamic reconfigurability [16]. Architectures, protocols, and languages for Agents have been subjected to standardization by the Foundation for Intelligent and Physical Agents (FIPA) in response to
3 H. Xu et al. /Journal of Computational Information Systems 7:7 (2011) the interest of telecommunication companies for applying Agents for the intelligent management of networks [17]. Fig.1 Agent-based P2P Traffic Control Model (1) Manager Agent (MA): MA exchanges information with traffic information collect agent and determines whether to limit P2P traffic, if the traffic needs to be restricted then traffic control agent run P2P traffic control procedures. MA manages trace agent and system information database, and provides interfaces between system and network administrator. MA accumulates and assesses the information from the collect agent sent to collect all the information, if the P2P traffic flow information exceeds a certain preset value, MA will notify the traffic control agent to implement P2P traffic control. MA may reside on switch device in each local network. (2) P2P Flow Monitor: Monitor exists in each local network. Through monitoring each network s switch or routing device, it will find whether P2P traffic is existed in the network, and the monitoring results will be reported to MA. The method of P2P traffic identification can be used by the P2P traffic detection technology which is introduced in the section I s related work. (3) Traffic Information Collect Agent: It is mobile, and collects the target network with a variety of P2P-related information (such as IP, communicating port, the use of P2P protocols, etc.), and the results will be returned to MA. (4) System Information Database and Information Database: System information database is located in MA machine, which is used to collect and record all the information from the network, and will track each routing integrate all information of P2P connection. Information database is located in P2P traffic monitor for storing P2P control operation s log. (5) Trace Agent: After P2P traffic monitor device detects P2P traffic, P2P traffic monitor will release trace agent to track the location of each node in the network, and interact with the traffic control agent information in order to facilitate to implementation of the P2P flow control.
4 2310 H. Xu et al. /Journal of Computational Information Systems 7:7 (2011) (6) Traffic Control Agent: Traffic control agent implements specific control strategies, such as restriction of the total P2P traffic, P2P flow rate, based on time stamp, etc, to ensure the QoS of all services in the management network. Fig. 2 P2P Traffic Control Flow Chart Figure 2 is the flow chart of mobile agent-based P2P flow control model. The P2P flow control process is as follows: Step 1. P2P Traffic Monitor opens monitor and detects each data link connection whether it is a P2P connection. Detection method is based on the previous section I which introduces the P2P traffic detection technology. Step 2. If it is the P2P connection, the P2P Traffic Monitor recognizes the connection information of the node (such as IP, communication port and other information) and puts the information into the database, and generates traffic information collection agent, and also transmits this information to MA. Step 3. Based on current network conditions, MA tracks and controls this P2P connection. If the connection does not been tracking then it will be released. If tracking then MA creates trace agent, and puts this connection information to the P2P flow control table, and notifies P2P traffic monitor to run real-time monitoring and controlling. Step 4. After P2P flow monitor receives MA notification information, P2P flow monitor real-time statistics P2P flow information and stores those information into the database, and makes a judge, when more than the limited value and it will notify the flow control agent, then closes this P2P connection, and transmits the related operation information and data to notify P2P traffic information collection agent.
5 H. Xu et al. /Journal of Computational Information Systems 7:7 (2011) Key Technology of ATCM Implementation ATCM uses Jpcap packet capture to analysis data, the Java language and Aglet to design Mobile Agent, and uses XML data access technology to store data Real-time Traffic Data Capture Technology P2P traffic monitor data capture module is the core of the implementation, and it is implemented by using Jpcap [18]. Jpcap is able to crawl and send a network packet by Java components, which can be used through a network interface to send any packets. Jpcap can capture Ethernet, IPv4, IPv6, ARP / RARP, TCP, UDP and ICMPv4 packets. Jpcap call wincap/libcap, and the Java language provides a common interface to achieve the platform independence Secure Mobile Agent Technology Aglet is a pure Java development with IBM for the mobile agent development technology, and provide a practical platform-- Aglet Workbench [19], allow people to develop or implement mobile agent system. It provides a simple and comprehensive programming model for mobile agent, and agent provides a dynamic and effective communication mechanism. It also provides a context to manage Aglet basic behaviors: such as create Aglet, copy or distribute Aglet to the destination machine, recall remote Aglet, suspend or wake Aglet, and remove Aglet and so on. These characteristics meet our proposed ATCM to achieve functional requirements. We use Java language and Aglet to implement mobile agent XML-based Database Access Technology System Information Database and Information Database need support layer for database, in order to be to effectively integrate with Java and the all solution of ATCM, we use XML-based database [20]. The advantage of using XML technology is that the data is exchangeability, and it has the following advantages of data applications: (1) XML file is a pure text file, no operating system and software platform restrictions; (2) XML is based on Schema, which is easy to describe the semantics of data, while the description can be understood and automatic processing by computer; (3) XML can describe structured, semi-structured and unstructured data. Figure 3 is the experimental network topology of the P2P traffic monitor system which is implemented according to the P2P flow control model. In the topology, Peer A and Peer B, Peer C and Peer D are belonging to a different network segment. In the experiment, Peer A and Peer C use P2P software (such as BitTorrent, emule, etc.) to download the same video compression package files, while Peer B and Peer D use FTP downloads and Web access operation simultaneously; P2P traffic monitoring server A opens monitoring, and P2P traffic monitoring server B closes monitoring. Deep Packet Inspection (DPI) technology [21] is used in the experiment on the P2P traffic information statistic. Experiment compares the download traffic of the router R1 and router R2, and the download rate of Peer A and Peer C. Performance results are shown in Figure 4 and Figure 5.
6 2312 H. Xu et al. /Journal of Computational Information Systems 7:7 (2011) Experimental Results and Discussions As can be seen from Figure 4, the growth of download traffic of Router 1 which opens the P2P flow control is smaller than that of Router 2 which without open P2P flow control; As also can be seen from Figure 5, the download rate of Peer A is smaller than that of Peer C, because in the beginning 3 minutes of the start download time, while P2P clients stay in the stage of finding resources, the download rate of Peer A and Peer C are little difference, with the P2P client to find a lot of resources, after 3 minutes later, the download rate of the Peer C increases rapidly in the segment of not opening P2P flow control, and he download rate of the Peer A did not change significantly because it locates in the segment of opening P2P flow control. Fig. 3 Network Topology Fig. 4 Routers Download Traffic Fig.5 Peers Download Rate Experimental results show that the mobile agent based P2P traffic control system can achieve the purpose of controlling P2P traffic, make a lot of P2P traffic bandwidth down, ensure that other applications traffic would be enhanced, and so as to effectively guarantee quality of service (QoS) of other network applications.
7 H. Xu et al. /Journal of Computational Information Systems 7:7 (2011) Conclusions and Future Work This paper presents an efficient agent-based traffic control management mechanism (ATCM) for P2P traffic, which uses mobile agent s mobility, autonomy and intelligence, etc. Our scheme provides a new way for P2P traffic control and management. In the system s implementation, the database records is transferred into XML documents forms, and the Java language and Aglet platform are used for development of mobile agent. Experimental results show that the control system can control the P2P traffic effectively, improve the flow distribution in P2P network, save network bandwidth, and ensure quality of service of other critical business. As a result, ATCM eliminates the complexity of the original flow control, achieves a better control of P2P traffic, and the scheme is easy to be deployed in the Internet environment. However, because of P2P protocol s multiplicity, it is difficult to identification P2P traffic, thus how to detection P2P flow are the main work to do in the future work. Acknowledgement The subject is sponsored by the National Natural Science Foundation of P. R. China ( ) Scientific & Technological Support Project (Industry) of Jiangsu Province (No. BE ,BE ) The Special Foundation for Development of Modern Service Industry of Jiangsu Province Project sponsored by Jiangsu provincial research scheme of natural science for higher education institutions (10KJB KJB520014) Scientific Research & Industry Promotion Project for Higher Education Institutions(JH10-14) Postdoctoral Foundation ( B) Science & Technology Innovation Fund for higher education institutions of Jiangsu Province (CX10B-196Z,CX10B-197Z,CX10B-198Z,CX10B-199Z,CX10B-200Z) the six kinds of Top Talent of Jiangsu Province ( ) Doctoral Fund of Ministry of Education of China ( ) and key Laboratory Foundation of Information Technology processing of Jiangsu Province (KJS1022). The authors would like to thank the editor and the anonymous reviewers, who provide insightful and constructive comments for improving this paper. References [1] J. Erman, A. Mahanti, M. Arlitt, et al. Identifying and discriminating between web and peer-to-peer traffic in the network core. Proceedings of the 16th international conference on World Wide Web(WWW 2007), pages , [2] S. Kamei and T. Kimura. Cisco IOS NetFlow Overview. Whitepaper, available at Cisco Systems Inc [3] M. Crovella and B. Krishnamurthy. Internet measurement: infrastructure, traffic and applications. John Wiley and Sons Ltd.West Sussex, England, [4] S. Sen, O. Spatscheck, and D. Wang. Accurate, Scalable In Network Identification of P2P Traffic using Application Signatures. Proceedings of the 13th International World Wide Web Conference, pages , [5] P. Haffner, S. Sen, O. Spatscheck, and D. Wang. Acas:Automated construction of application signatures. In Proceedings of the SIGCOMM05 Workshops, [6] T. Karagiannis, A. Broido, M. Faloutsos and K. Claffy. Transport layer identification of P2P traffic. In Proceedings of the ACM SIGCOMM Internet Measurement Conference, pages , [7] A. McGregor, M. Hall, P. Lorier, et al. Flow clustering using machine learning techniques. In PAM Antibes Juan-les-Pins, France, April, [8] A. Zander, T. Nguyen, G. Armitage. Automated traffic classification and application identification using machine learning. In LCN 2005, Sydney, Australia, pages , [9] L. Bernaille, R. Teixeira, I. Akodkenou. Traffic classification on the fly. ACM SIGCOMM Comput Commun
8 2314 H. Xu et al. /Journal of Computational Information Systems 7:7 (2011) Review, 36(2): 23-26, [10] A. W. Moore, D. Zuev. Internet traffic classification using Bayesian analysis techniques. In ACM SIGMETRICS 2005, pages 50-60, [11] J. Park, H. R. Tyan, C. Kuo. Internet traffic classification for scalable QoS provision. In 2006 IEEE International Conference on Multimedia and Expo. Toronto, Ontario, Canada, pages , [12] T. Nguyen, G. Armitage. Training on multiple sub-flows to optimize the use of Machine Learning classifiers in real-world IP networks. In LCN 2006, Tampa, Florida,USA, pages , [13] D. Bonfiglio, M. Mellia, M. Meo, et al. Revealing Skype traffic: when randomness plays with you. In SIGCOMM 07. New York, NY, USA, August. pages 37-38, [14] T. Auld, A. W. Moore, S. F. Gull. Bayesian neural networks for Internet traffic classification. IEEE Trans Neural Netw, 18(1): , [15] R. Zhang, J. Chang, H. Zhou, et al. P2P traffic detection on large scale netflow data. Journal of Computational Information Systems, 4(2): , [16] M. Luck, P. McBurney, C. Preist, A manifesto for agent technology: Towards next generation computing. Autonomous Agents and Multi-Agent Systems, 9 (3): , [17] G. Fortino, W. Russo. Using P2P, GRID and Agent technologies for the development of content distribution networks. Future Generation Computer Systems, 24: , [18] Z. H. Shen, H. Wang. Network Data Packet Capture and Protocol Analysis on Jpcap-Based. Proceedings of the 2009 International Conference on Information Management, Innovation Management and Industrial Engineering, USA: IEEE COMPUTER SOC, 3: , [19] D. B. Lange, D. T. Chang. IBM Aglets Workbench Programming Mobile Agents in Java. White Paper, Japan: IBM Corporation, [20] B. Mclaughlin. Java & XML, 2nd Edition. O'Reilly Media, Inc., [21] S. Sen, J. Wang. Analyzing Peer-to-Peer Traffic Across Large Networks. IEEE/ACM Transactions on Networking, 12(2): , 2004.
Encrypted Internet Traffic Classification Method based on Host Behavior
Encrypted Internet Traffic Classification Method based on Host Behavior 1,* Chengjie GU, 1 Shunyi ZHANG, 2 Xiaozhen XUE 1 Institute of Information Network Technology, Nanjing University of Posts and Telecommunications,
More informationCLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab
More informationUsing UDP Packets to Detect P2P File Sharing
188 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 27 Using UDP Packets to Detect P2P File Sharing Tsang-Long Pao and Jian-Bo Chen Tatung University, Taipei,
More informationTraffic Classification with Sampled NetFlow
Traffic Classification with Sampled NetFlow Valentín Carela-Español, Pere Barlet-Ros, Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {vcarela,pbarlet,pareta}@ac.upc.edu Abstract The traffic
More informationResearch on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
More informationHow To Classify Network Traffic In Real Time
22 Approaching Real-time Network Traffic Classification ISSN 1470-5559 Wei Li, Kaysar Abdin, Robert Dann and Andrew Moore RR-06-12 October 2006 Department of Computer Science Approaching Real-time Network
More informationTraffic Analysis of Mobile Broadband Networks
Traffic Analysis of Mobile Broadband Networks Geza Szabo,Daniel Orincsay,Balazs Peter Gero,Sandor Gyori,Tamas Borsos TrafficLab, Ericsson Research, Budapest, Hungary Email:{geza.szabo,daniel.orincsay,
More informationForensic Network Traffic Analysis
Forensic Network Traffic Analysis Noora Al Khater Department of Informatics King's College London London, United Kingdom noora.al_khater@kcl.ac.uk Richard E Overill Department of Informatics King's College
More informationAn apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
More informationNear Real Time Online Flow-based Internet Traffic Classification Using Machine Learning (C4.5)
Near Real Time Online Flow-based Internet Traffic Classification Using Machine Learning (C4.5) Abuagla Babiker Mohammed Faculty of Electrical Engineering (FKE) Deprtment of Microelectronics and Computer
More informationResearch on Video Traffic Control Technology Based on SDN. Ziyan Lin
Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) Research on Video Traffic Control Technology Based on SDN Ziyan Lin Communication University of China, Beijing
More informationPeer to peer networking: Main aspects and conclusions from the view of Internet service providers
Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Gerhard Haßlinger, Department of Computer Science, Darmstadt University of Technology, Germany Abstract:
More informationA Scheme for Implementing Load Balancing of Web Server
Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public
More informationNetwork congestion control using NetFlow
Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.
More informationHMC: A Novel Mechanism for Identifying Encrypted P2P Thunder Traffic
HMC: A Novel Mechanism for Identifying Encrypted P2P Thunder Traffic Chenglong Li* and Yibo Xue Department of Computer Science & Techlogy, Research Institute of Information Techlogy (RIIT), Tsinghua University,
More informationPacket Flow Analysis and Congestion Control of Big Data by Hadoop
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.456
More informationCisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
More informationLecture 28: Internet Protocols
Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further
More informationA Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification
A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification Riyad Alshammari and A. Nur Zincir-Heywood Dalhousie University, Faculty of Computer Science {riyad, zincir}@cs.dal.ca
More informationClassifying P2P Activity in Netflow Records: A Case Study on BitTorrent
IEEE ICC 2013 - Communication Software and Services Symposium 1 Classifying P2P Activity in Netflow Records: A Case Study on BitTorrent Ahmed Bashir 1, Changcheng Huang 1, Biswajit Nandy 2, Nabil Seddigh
More informationOnline Classification of Network Flows
2009 Seventh Annual Communications Networks and Services Research Conference Online Classification of Network Flows Mahbod Tavallaee, Wei Lu and Ali A. Ghorbani Faculty of Computer Science, University
More informationRealtime Classification for Encrypted Traffic
Realtime Classification for Encrypted Traffic Roni Bar-Yanai 1, Michael Langberg 2,, David Peleg 3,, and Liam Roditty 4 1 Cisco, Netanya, Israel rbaryana@cisco.com 2 Computer Science Division, Open University
More informationHadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
More informationClassifying P2P Activities in Netflow Records: A Case Study (BitTorrnet & Skype) Ahmed Bashir
Classifying P2P Activities in Netflow Records: A Case Study (BitTorrnet & Skype) by Ahmed Bashir A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial fulfillment of the requirements
More informationAggregating Correlated Naive Predictions to Detect Network Traffic Intrusion
Aggregating Correlated Naive Predictions to Detect Network Traffic Intrusion G.Vivek #1, B.Logesshwar #2, Civashritt.A.B #3, D.Ashok #4 UG Student, Department of Computer Science and Engineering, SRM University,
More informationScalable Extraction, Aggregation, and Response to Network Intelligence
Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues
More informationpacket retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
More informationCurrent Trends of Topology Discovery in OpenFlow-based Software Defined Networks
1 Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks Leonardo Ochoa-Aday, Cristina Cervello -Pastor, Member, IEEE, and Adriana Ferna ndez-ferna ndez Abstract The explosion
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS
ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationUsing Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management
More information5 Applied Machine Learning Theory
5 Applied Machine Learning Theory 5-1 Monitoring and Analysis of Network Traffic in P2P Environment BAN Tao, ANDO Ruo, and KADOBAYASHI Youki Recent statistical studies on telecommunication networks outline
More informationQuestion: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
More informationComputer Networks & Security 2014/2015
Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!
More informationFrom Centralization to Distribution: A Comparison of File Sharing Protocols
From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015
More informationArchitecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern
More informationSPECIAL FEATURES OF TCP/IP NETWORK TRAFFIC AND PROBLEMS OF THE PROGRAM MONITORING. (1)Radi ROMANSKY
1 SPECIAL FEATURES OF TCP/IP NETWORK TRAFFIC AND PROBLEMS OF THE PROGRAM MONITORING (1)Radi ROMANSKY (1)Department of Computer Systems, Technical University Sofia e-mail address: rrom@tu-sofia.bg Bulgaria
More informationIndustrial Communication Whitepaper. Principles of EtherNet/IP Communication
Industrial Communication Whitepaper Principles of EtherNet/IP Communication 1 Contents Introduction...3 Producer/Consumer Model...4 EtherNet/IP Messaging Types...7 Real Time Data Exchanges...9 Typical
More informationOverview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
More informationIPv6 First Hop Security Protecting Your IPv6 Access Network
IPv6 First Hop Security Protecting Your IPv6 Access Network What You Will Learn This paper provides a brief introduction to common security threats on IPv6 campus access networks and will explain the value
More informationFlow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
More informationBandwidth Management Technology White Paper
Bandwidth Management Technology White Paper Keyword: Bandwidth management, segment-based bandwidth management, user-based bandwidth management, service-based bandwidth management, connection-based bandwidth
More informationComputer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill
Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET
More informationinet Enterprise Features Fact Sheet
2007 inet Enterprise Features Fact Sheet inetmon Sdn. Bhd. 1010 & 1011, Tingkat 10 Blok D, Dataran Usahawan Kelana,17, Jalan SS 7/26, Kelana Jaya, 47301 Petaling Jaya, Selangor Darul Ehsan Tel: 603-7880
More informationCover. White Paper. (nchronos 4.1)
Cover White Paper (nchronos 4.1) Copyright Copyright 2013 Colasoft LLC. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced
More informationNetwork Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationCMA5000 SPECIFICATIONS. 5710 Gigabit Ethernet Module
CMA5000 5710 Gigabit Ethernet Module SPECIFICATIONS General Description The CMA5710 Gigabit Ethernet application is a single slot module that can be used in any CMA 5000. The Gigabit Ethernet test module
More informationA Network Simulation Experiment of WAN Based on OPNET
A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2
More informationBandwidth Management for Peer-to-Peer Applications
Overview Bandwidth Management for Peer-to-Peer Applications With the increasing proliferation of broadband, more and more users are using Peer-to-Peer (P2P) protocols to share very large files, including
More informationNetwork Traceability Technologies for Identifying Performance Degradation and Fault Locations for Dependable Networks
Network Traceability Technologies for Identifying Performance Degradation and Fault Locations for SHIMONISHI Hideyuki, YAMASAKI Yasuhiro, MURASE Tsutomu, KIRIHA Yoshiaki Abstract This paper discusses the
More informationIdentifying Peer-to-Peer Traffic Based on Traffic Characteristics
Identifying Peer-to-Peer Traffic Based on Traffic Characteristics Prof S. R. Patil Dept. of Computer Engineering SIT, Savitribai Phule Pune University Lonavala, India srp.sit@sinhgad.edu Suraj Sanjay Dangat
More informationInternet Traffic Measurement
Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software
More informationCSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture
Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote
More informationSonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
More informationA Measurement of NAT & Firewall Characteristics in Peer to Peer Systems
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands l.dacunto@tudelft.nl
More informationRESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
More informationExperimentation driven traffic monitoring and engineering research
Experimentation driven traffic monitoring and engineering research Amir KRIFA (Amir.Krifa@sophia.inria.fr) 11/20/09 ECODE FP7 Project 1 Outline i. Future directions of Internet traffic monitoring and engineering
More informationA Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
More informationVPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu
VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
More informationLocal-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
More informationBotnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,
More informationClassifying Service Flows in the Encrypted Skype Traffic
Classifying Service Flows in the Encrypted Skype Traffic Macie Korczyński and Andrze Duda Grenoble Institute of Technology CNRS Grenoble Informatics Laboratory UMR 5217 Grenoble France. Email: [macie.korczynski
More informationThe Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang
International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang Nanjing Communications
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationWhat is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
More information100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
More informationand reporting Slavko Gajin slavko.gajin@rcub.bg.ac.rs
ICmyNet.Flow: NetFlow based traffic investigation, analysis, and reporting Slavko Gajin slavko.gajin@rcub.bg.ac.rs AMRES Academic Network of Serbia RCUB - Belgrade University Computer Center ETF Faculty
More informationPART III. OPS-based wide area networks
PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationEVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need
More informationA Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming
A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming Chin Yong Goh 1,Hui Shyong Yeo 1, Hyotaek Lim 1 1 Dongseo University Busan, 617-716, South Korea cgnicky@gmail.com, hui_shyong@hotmail.com,
More informationConfiguring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0
Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0 Abstract Avaya IP Softphone R3 V2.1 now supports H.323 VoIP applications running over different
More informationProtecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
More informationSignature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
More informationNetwork Protocol Configuration
Table of Contents Table of Contents Chapter 1 Configuring IP Addressing... 1 1.1 IP Introduction... 1 1.1.1 IP... 1 1.1.2 IP Routing Protocol... 1 1.2 Configuring IP Address Task List... 2 1.3 Configuring
More informationData Communication and Computer Network
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationThe Applications of Deep Learning on Traffic Identification
The Applications of Deep Learning on Traffic Identification Zhanyi Wang wangzhanyi@360.cn Abstract Generally speaking, most systems of network traffic identification are based on features. The features
More informationContent-Aware Load Balancing using Direct Routing for VOD Streaming Service
Content-Aware Load Balancing using Direct Routing for VOD Streaming Service Young-Hwan Woo, Jin-Wook Chung, Seok-soo Kim Dept. of Computer & Information System, Geo-chang Provincial College, Korea School
More informationHP IMC User Behavior Auditor
HP IMC User Behavior Auditor Administrator Guide Abstract This guide describes the User Behavior Auditor (UBA), an add-on service module of the HP Intelligent Management Center. UBA is designed for IMC
More informationLAN Switching and VLANs
26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access
More informationEXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationLab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
More informationResearch on Cloud Computing Network Architecture Based on SDN Technology Weibo Li
4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) Research on Cloud Computing Network Architecture Based on SDN Technology Weibo Li wuhan textile university, Wuhan,
More informationSoftware Defined Networking (SDN) - Open Flow
Software Defined Networking (SDN) - Open Flow Introduction Current Internet: egalitarian routing/delivery based on destination address, best effort. Future Internet: criteria based traffic management,
More informationCYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION MATIJA STEVANOVIC PhD Student JENS MYRUP PEDERSEN Associate Professor Department of Electronic Systems Aalborg University,
More informationIP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
More informationA Network Monitoring System with a Peer-to-Peer Architecture
A Network Monitoring System with a Peer-to-Peer Architecture Paulo Salvador, Rui Valadas University of Aveiro / Institute of Telecommunications Aveiro E-mail: salvador@av.it.pt; rv@det.ua.pt Abstract The
More informationDistributed Systems. 2. Application Layer
Distributed Systems 2. Application Layer Werner Nutt 1 Network Applications: Examples E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Social
More information21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
More informationPolitecnico di Torino. Porto Institutional Repository
Politecnico di Torino Porto Institutional Repository [Proceeding] NEMICO: Mining network data through cloud-based data mining techniques Original Citation: Baralis E.; Cagliero L.; Cerquitelli T.; Chiusano
More informationQRadar Security Intelligence Platform Appliances
DATASHEET Total Security Intelligence An IBM Company QRadar Security Intelligence Platform Appliances QRadar Security Intelligence Platform appliances combine typically disparate network and security management
More informationApplication of Internet Traffic Characterization to All-Optical Networks
Application of Internet Traffic Characterization to All-Optical Networks Pedro M. Santiago del Río, Javier Ramos, Alfredo Salvador, Jorge E. López de Vergara, Javier Aracil, Senior Member IEEE* Antonio
More informationAn Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
More informationEnlarge Bandwidth of Multimedia Server with Network Attached Storage System
Enlarge Bandwidth of Multimedia Server with Network Attached Storage System Dan Feng, Yuhui Deng, Ke Zhou, Fang Wang Key Laboratory of Data Storage System, Ministry of Education College of Computer, Huazhong
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationP2P VoIP for Today s Premium Voice Service 1
1 P2P VoIP for Today s Premium Voice Service 1 Ayaskant Rath, Stevan Leiden, Yong Liu, Shivendra S. Panwar, Keith W. Ross ARath01@students.poly.edu, {YongLiu, Panwar, Ross}@poly.edu, Steve.Leiden@verizon.com
More information