On the Impact of P2P File Sharing Traffic Restrictions on User Perceived Performance

Size: px
Start display at page:

Download "On the Impact of P2P File Sharing Traffic Restrictions on User Perceived Performance"

Transcription

1 On the Impact of P2P File Sharing Traffic Restrictions on User Perceived Performance Ricardo Lopes Pereira, Teresa Vazão Instituto Superior Técnico Av. Prof. Dr. Cavaco Silva, Porto Salvo, Portugal Abstract Peer to Peer (P2P) File Sharing (FS) applications represent, today, the major traffic source on the Internet. Unlike other traffic types, such as HTTP, where the major traffic sources are identifiable, peers are, by definition, spread over the Internet, making it hard for ISPs to architect their networks to accommodate Peer to Peer traffic. In order to alleviate the impact of P2P FS traffic on other applications, ISPs often resort to price strategies based on traffic or traffic shaping techniques, in order to restrict P2P FS applications usage. The success of these initiatives is often limited, as they may aggravate other customers which do not use P2P FS or be circumvented by some of the P2P FS applications, which try to misrepresent their traffic as belonging to other applications. In this paper we study the impact that different methods for P2P FS traffic reduction have on the traffic carried by ISPs and on the download performance perceived by P2P FS users. Through simulation we compared the usage of traffic shaping with the more recent techniques Biased Neighbour Selection () and Adaptive Search Radius (). We observed that traffic shaping provides ISPs with the fewer traffic savings, especially when compared to the price paid by P2P FS users. and provide similar benefits for users and ISPs. We ve also observed that and are complementary technologies, which may be combined in order to achieve higher efficiency. I. INTRODUCTION Peer-to-Peer (P2P) File Sharing (FS) applications are wildly disseminated. Their popularity is such that several sources indicate that they are responsible for up to 70% of the Internet traffic [1], [2]. Contrary to what was expected by some, the availability of commercial music and video download services and the legal pressure imposed by copyright owners associations, such as RIAA, did not cause P2P FS adoption to slow down. P2P FS traffic exhibits a behaviour very distinct from that of traditional applications such as or HTTP, one that most ISPs networks were not designed to handle [1], [2]: Upstream/downstream ratio: Applications such as HTTP exhibit a very high download/upload ratio, which has used to plan many networks. P2P FS users have incentives to upload as much as they download, and some peers may even operate only as uploaders (seeders). Time of day usage patterns: ISPs expect their user population to follow certain behaviour patters. For instance, home users are only expected to use the network at evening and during weekends. P2P FS applications are often left unattended, running 24 hours a day. Traffic sources: traffic originates mostly from servers within an ISP s own network. HTTP traffic comes primarily from local proxies or from a few well known popular sites. P2P traffic can originate anywhere. A peer might decide to download a file part from a peer within the same ISP or from across the world. Over-Subscription ratios: A typical HTTP user will download a page and then spend some time reading it. This allows ISPs to use large over-subscription ratios, as most of the time users aren t utilising the bandwidth made available to them. The download of a large movie file via P2P may take many hours, while it will only take about two hours to view it. P2P FS users will download/upload almost continuously. P2P FS traffic increases ISPs transit and peering costs while affecting the performance of other applications, which can alienate costumers, increasing costumer churn. Upgrading the network to higher bandwidth is not an option as the increased cost would not be compensated by additional revenue. Furthermore, as P2P FS applications are designed to consume as much bandwidth as possible, the new bandwidth would rapidly be consumed. Blocking P2P FS traffic isn t an option either, as P2P FS applications are one of the drivers behind broadband adoption. Doing it would most likely result in the loss of large numbers of subscribers. The increasing usage of P2P FS technology for independent and commercial music, video and software distribution means that the problem is here to stay, and ISPs and P2P FS users must find ways to balance their goals. The main contribution of this paper is a simulation study of some of the options available for minimising the impact of P2P FS traffic on the Internet and on ISPs business. We compare the tradeoff between the traffic savings reaped by an ISP and the performance impact suffered by its P2P using costumers when using three different techniques: traffic shaping, Biased Neighbour Selection () and Adaptive Search Radius (). We ve found that these technologies are complementary, and also studied the effect of combining them. The second contribution is the utilisation of a simulation model which implements the full dynamics of a real P2P protocol (edonkey), taking into account all the effects at the network, transport and application layers, instead of a simple abstraction.

2 In the next section the traffic saving techniques are discussed, along with other methods for reducing the cost incurred by ISPs with P2P FS. Section III presents the simulation study and its findings. Section IV presents the conclusions and plans for future work. II. COST REDUCTION TECHNIQUES It has been observed that P2P FS shows strong locality properties, both in terms of network topology and geography, suggesting that self-caching mechanisms could be enacted by forcing peers to download from nearby peers instead of distant ones [3], [4]. Self-caching would potentially result in better performance for users and lower costs for ISPs. and are two techniques that explore these locality properties. Traffic shaping is a more traditional approach, which limits the amount of bandwidth made available to P2P applications. A. Biased neighbour selection Biased Neighbour Selection is a technique proposed for use with the BitTorrent protocol [5]. It consists of using a transparent redirector, which intercepts the communication from peers inside an ISP s network with the tracker. The sources (peers) provided by the tracker are filtered and replaced in order to force the peer to communicate mainly with other peers within the ISP s network. Only a few peers from outside the ISP s network are provided, to ensure that the download will complete successfully. requires ISPs to run the query interceptors at the edge of their networks, using deep packet inspection in order to intercept communications to the tracker/server and other peers (due to peer source exchange and the growing use of Kademlia). It is a solution that each ISP may choose to use on its own, limiting the amount of traffic exchanged with other ISPs while benefiting users, which are expected to download faster from within their own ISP s network. reduces the costs incurred by an ISP when there are enough sources for the file within its network. Otherwise it provides no advantages, as the files will have to be downloaded from the outside. Furthermore it also fails to reduce the amount of upload traffic, as it doesn t prevent outside peers from downloading from the peers within the ISP s network. The basic concept of had already been suggested before in studies conducted on traffic traces of Kazaa and BitTorrent, where byte hit ratios of up to 63% were estimated to be achievable by exploring locality properties within an ISP [6], [7]. B. Adaptive Search Radius consists of a peer selection algorithm which can be used with emule, BitTorrent or other P2P file sharing applications [8]. Instead of downloading from any peer, selects a subset of the peers it knows, the nearest ones (fewer IP network hops), allowing the file download to be performed with a smaller impact on the Internet. uses file availability as a metric. This is defined as the number of contactable peers sharing the rarest file part the peer doesn t already have. As uploaders are contacted, their distance (in network hops) and the file parts they share are determined. Minimum and maximum file availability thresholds are defined as constant values in the algorithm. An peer maintains a value for the Search Radius of every file, the maximum distance (in network hops) a peer may be in order to be considered. After learning (or updating) which file parts a peer shares, the file availability is calculated. If the file availability is larger than the maximum threshold, the search radius is reduced by one hop while it remains larger than the minimum threshold. If all peers within the search radius have been contacted but file availability remains below the minimum threshold, the search radius is increased one hop. will result in the use of file sources local to the ISPs network when these are available. When contacting peers outside an ISP s network, the closest ones will be used. Figure 1 depicts the behaviour of a P2P file sharing client (node H) while downloading a file. Filled circles represent peers, empty ones represent routers. Filled lines represent links not being used by file transfers to peer H, while dotted lines represent links crossed by file transfer traffic. Node H, through the use of a file sharing P2P protocol, has learned that nodes A to I share the wanted file. In figure 1(a), peer H does not use to filter out distant peers, downloading from all of them. Therefore, download traffic crosses most links, contributing to their congestion. Figure 1(b) shows what happens when is used. In this example, it is assumed that calculated a search radius of 4 network hops. This means, that peers F (4 hops), G (2 hops) and I (3 hops), together provide the required minimum number of sources for all the pieces peer H still has to download. As peers restrain from downloading from peers outside the search radius for each file, information travels fewer network hops, releasing capacity on all other links. Peer H still needs to download a full copy of the file, but the download, being performed from close peers, impacts fewer Internet links. The decreased number of peers to download from is compensated by having to wait less to start downloading, as upload queues are shorter. Since each downloading peer will restrict the set of peers it downloads from, each uploader will have to satisfy fewer requests. should result in lower P2P traffic crossing ISP s boundaries while providing users with faster downlodas. However, this is not a method that ISPs can deploy on their own. Instead it would have to be built into P2P software. C. Traffic shaping In order to control the impact of P2P FS traffic on their networks, many ISPs have deployed traffic shaping equipment. This performs deep packet inspection on incoming or outgoing traffic, in order to determine the traffic flows which correspond to P2P FS sessions. Having identified P2P FS traffic, QoS techniques may be applied to it. ISPs may choose to limit the aggregate rate of P2P FS traffic, the rate of individual users traffic or provide all P2P FS traffic with a less than best effort treatment. This allows ISPs to limit the effect P2P FS has on

3 (a) Without (b) With using search radius of 4 Fig. 1. Links crossed by file download traffic by node H their networks, benefiting other applications, without requiring additional investments in bandwidth. However, P2P FS traffic is difficult to identify as developers continuously try to circumvent detection. This means that some P2P FS traffic will always get past unidentified. The risk for false positives also exists. Furthermore, the processing required for deep packet inspections may cause some delay on all traffic [2]. This may alienate some subscribers. Traffic shaping affects all P2P FS traffic equally. Even though users may not have the right to complaint that their illegal downloads are slow, they will protest when it affects their rightful downloading activities [1]. This may cause legal problems for ISPs, which may be accused of favouring other commercial content distribution methods, especially when network neutrality is being discussed in some countries. D. Other methods Some ISPs have abandoned unlimited traffic subscription plans or increased their prices. Users are now offered different subscription plans, with different monthly bandwidth allowances. Extra traffic is charged at high rates, which discourages heavy P2P FS usage. This transfers the costs associated with P2P FS traffic back to the users responsible for the traffic. However, it also impacts other heavy users, not only P2P FS users. Furthermore, it overlooks that P2P FS traffic has been one of the drivers behind broadband adoption. This method will only work when there is no competition offering unlimited plans, as otherwise it will result in subscribers leaving for the competition. ISPs have also taken advantage of P2P FS protocols reciprocity, which provide peers with download speeds correlated to their upload speed. Many ISPs restrict the upload speed well beyond that imposed by the access technology used to connect the subscribers. One such example is the use of ADSL, where even though the maximum download speed is often used, only a fraction of the possible upload speed is offered. P2P FS cache is a concept similar to HTTP caches, with which ISPs are familiar. Caches intercept P2P connections going outside the ISP s network and impersonate remote peers. If the content is present in the cache, it will be served locally, otherwise the remote peer will be contacted by the cache, which will keep a copy of the content while delivering it to the requesting peer. Byte hit ratios as high as 80% are claimed by P2P caching solution vendors [1]. The use of caches provides P2P FS users with similar or better performance, while releasing bandwidth for other applications, allowing ISPs to avoid or delay investments into network upgrades. However, running a cache may implicate an ISPs in illegal sharing of copyrighted content, subjecting it to legal problems. Also, it has been observed that large video files are the fastest growing file type in P2P networks, representing the largest (65%) portion of bytes transfered. These files are the ones a cache system should address, however, their size and number require too large a storage system to be easily performed outside the P2P network [6]. A. Simulation scenario III. EVALUATION We evaluated, and traffic shaping using the SSFNet 2.0 network simulator, which provides the Layer 2,3 and 4 [9]. On it, we implemented the edonkey/emule protocol. We used the GT-ITM topology generator to create a transitstub network with 350 routers and 840 P2P FS peers [10]. Hosts are connected to their routers using 0.5 and 1Mb/s links. Stub routers are connected among themselves using 5 and 10 Mb/s links. Stub networks are connected to each other and to transit networks using 2 and 5 Mb/s links. Transit routers are connected using 10, 20 and 50Mb/s links. Transit networks are connected using 10 and 20Mb/s links. We simulated the distribution of a 100MB file, seeded by 7 peers to the other 834. This depicts a situation where a company uses P2P FS to distribute some content (for instance e-learning) to their various offices, or a flash crowd where hosts continue to share after finishing their downloads.

4 Each time a peers asked the server for file sources, it would reply with at most 50 peers. When using, of this 50 peers, up to 40, if available, would be within its own ISP. was configured to increase its search radius when the file availability was below 3 and to reduce it when file availability was greater than 6. Traffic shaping was used by limiting the aggregate P2P FS bandwidth permitted on the stub-stub and stub-transit links, using a bit-bucket. We experimented limiting the available P2P FS bandwidth to 4, 3, 2, 1 and 0.5 Mb/s. I ve also decided to combine the use of both and, being that these are not conflicting technologies. The use of will allow to converge on close-by peers more quickly, as the peers it learns about will be mostly within the same ISP. From the point of view of, the use of will allow the peer to choose the closest peers from within the ISP, instead of using a random set. Also, while is unable to provide traffic savings when there are no sources within the same ISP, will download from the closer peers. B. Result analysis Table I shows the main metrics gathered from the experiments. We can observe that both, and their combination provide significant improvements on all metrics over the use of plain edonkey/emule, both from the point of view of the ISPs and of the subscriber. From the subscriber perspective, any of the alternatives, alone, result in noticeably faster downloads, with having a slight advantage. Their combination provides even better results. This means that users would not feel alienated by any of these technologies but rather have the feeling that the ISP embraces P2P FS, which could result in increased costumer loyalty. From the point of view of a transit ISP, both and result in very significant traffic savings, which could be translated into better and cheaper services for their regional ISP costumers. The combination of and results in the release of more than two thirds of the used bandwidth. From the point of view of the regional ISP, which provides the service for the P2P FS users, the use of or results in a reduction of the intra-isp (stub) traffic and in an even more significant reduction of the traffic exchanged with the other ISPs (inter-isp). The combined use of and TABLE I COMPARING THE DIFFERENT TECHNIQUES / Avg. Download Time (s) Transit Traffic (GB) Stub Traffic (GB) Inter-ISP Traffic (GB) Number of Connections (K) Avg. Hops Crossed Efficiency (%) results in even more savings, especially on the inter-isp traffic, which is reduced to less than a third. The large reduction in inter-isp traffic would allow ISPs to significantly reduce their peering and transit costs, which could provide a competitive advantage. Also significant is the reduction in terms of number of connections necessary to distribute the file. Here we see that has an advantage over, but not over their combined use. Even though the number of connections affects primarily the peers, being that TCP is an end-to-end protocol, the fewer connections to keep track of allow for better scaling of any deep packet inspection equipment used by complementary techniques. We can also observe that the average number of network hops crossed by each P2P FS data packet is reduced by the use of and even more by the use of. Their combined use yields the best results. The last metric used was efficiency, were we measure the amount of traffic which crossed every network link against the ideal minimum traffic required to copy the file from the sources to all the other peers. The minimum traffic was calculated by determining the number of links present in the minimum spanning tree rooted at all the sources, which encompassed all the downloading peers. The number of links was them multiplied by the size of the file. It would be impossible for any protocol to reach 100% efficiency as this does not take into account any of the protocol overheads suffered by the real protocols (IP, TCP, edonkey/emule). Once again we can observe that the use of or is advantageous, with having an edge over. Their combination is, once again, very beneficial. Figure 2 show the evolution of the amount of inter-isp traffic used when the allowed inter-isp bandwidth is varied by traffic shaping. We can observe that significant savings are only accomplished when the bandwidth is reduced to 1Mb/s. The reduction of the bandwidth from 1 to 0.5 Mb/s results in a faster decrease in the traffic consumption. The different techniques maintain their relative positions with the different bandwidths, except for 0.5Mb/s, where provides much greater savings than, indicating that copes better with traffic shaping. Figure 3 shows the behaviour of the average download time achieved by the several techniques under different traffic shaping restrictions. It is noticeable that users pay a high price for the use of traffic shaping. The plain edonkey/emule protocol would not allow ISPs to reduce P2P FS traffic below the 2Mb/s, in this particular scenario, or they would witness massive subscriber churn. However, only bellow this mark were traffic saving noticeable. shows a much better behaviour, but it would also prevent the use of 0.5Mb/s, and even 1Mb/s could be risky. show a behaviour very close to that of and combined, and both methods would allow P2P FS traffic to be limited to 1Mb/s without causing major annoyance to subscribers. Figure 4 shows the evolution of the traffic efficiency of the several techniques under different traffic shaping restraints. It

5 Inter-ISP P2P FS traffic (GB) / Efficiency (%) / Fig. 2. Amount of traffic exchanged among ISPs versus allowed bandwidth Fig. 4. Efficiency of the several techniques under different bandwidths Average download duration (s) Fig / 0 Behaviour of download time with different bandwidths is observable that the relative positions are always maintained. However, we can see that combined with and, especially, by it self, react better to severe bandwidth restrictions, increasing their efficiency. Under the 0.5 Mb/s, the plain edonkey/emule protocol reduced its performance, as the reduced bandwidth becomes insufficient for both data and control messages, reducing each peer capacity do discover new, closer-by peers. IV. CONCLUSIONS We analysed the impact of three different bandwidth saving techniques, which have the potential to reduce ISP s costs with P2P FS traffic: Biased Neighbour Selection, Adaptive Search Radius and Traffic Shaping. We ve used a network simulator and a faithful implementation of the edonkey/emule protocol to analyse the impact of every combination of the above techniques on the traffic carried and exchanged by an ISP and on the download time perceived by subscribers. We ve concluded that the techniques are complementary, and that they may be combined, all three, in order to achieve the best results. Traffic shaping, of the three the only technique which is wildly deployed, proved to be the least effective. Not only does it provide modest traffic reduction, but renders P2P FS unusable, due to the very high download times. and, being very different by design, provide similar results. provided slightly faster downloads and slightly higher inter-isp traffic savings which result in more immediate advantages for ISPs. However, generates slightly greater savings for the transit ISPs, which could result in cheaper transit rates for regional ISPs. also behaves better when combined with extreme traffic shaping, providing greater inter-isp traffic savings and faster downloads. The best results were, under every circumstance, achieved by the combination of and. REFERENCES [1] PeerApp. (2007, Mar.) Comparing P2P Solutions. White Paper. [Online]. Available: [2] Sandvine. (2004) Meeting the Challenge of Today s Evasive P2P Traffic. White Paper. [Online]. Available: general/getfile.asp?fileid=16 [3] J. Chu, K. Labonte, and B. N. Levine, Availability and Locality Measurements of Peer-to-Peer File Systems, in ITCom: Scalability and Traffic Control in IP Networks, [4] A. Klemm, C. Lindemann, M. K. Vernon, and O. P. Waldhorst, Characterizing the query behavior in peer-to-peer file sharing systems. in Internet Measurement Conference, A. Lombardo and J. F. Kurose, Eds. ACM, 2004, pp [5] R. Bindal, P. Cao, W. Chan, J. Medval, G. Suwala, T. Bates, and A. Zhangan, Improving Traffic Locality in BitTorrent via Biased Neighbor Selection, in ICDCS, July [6] P. K. Gummadi, R. J. Dunn, S. Saroiu, S. D. Gribble, H. M. Levy, and J. Zahorjan, Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. in SOSP, 2003, pp [7] T. Karagiannis, P. Rodriguez, and D. Papagiannaki, Should ISPs fear Peer-Assisted Content Distribution? in ACM SIGCOMM/USENIX IMC 05, Oct [8] R. L. Pereira, T. Vazão, and R. Rodrigues, Adaptive Search Radius - Lowering Internet P2P File-Sharing Traffic through Self-Restraint, in The 6th IEEE International Symposium on Network Computing and Applications (IEEE NCA07), [9] J. H. Cowie, D. M. Nicol, and A. T. Ogielski, Modeling the Global Internet, Computing in Science & Engineering, vol. 1, no. 1, pp , [10] E. W. Zegura, K. L. Calvert, and S. Bhattacharjee, How to model an internetwork, in INFOCOM, 1996, pp

Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic

Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic William Acosta and Surendar Chandra University of Notre Dame, Notre Dame IN, 46556, USA {wacosta,surendar}@cse.nd.edu Abstract.

More information

Should Internet Service Providers Fear Peer-Assisted Content Distribution?

Should Internet Service Providers Fear Peer-Assisted Content Distribution? Should Internet Service Providers Fear Peer-Assisted Content Distribution? Thomas Karagiannis, UC Riverside Pablo Rodriguez, Microsoft Research Cambridge Konstantina Papagiannaki, Intel Research Cambridge

More information

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390 The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Lecture 6 Content Distribution and BitTorrent

Lecture 6 Content Distribution and BitTorrent ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Lecture 6 Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent

More information

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu Dilip Kumar Krishnappa, Samamon Khemmarat, Lixin Gao, Michael Zink University of Massachusetts Amherst,

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

3. Some of the technical measures presently under consideration are methods of traffic shaping, namely bandwidth capping and bandwidth shaping 2.

3. Some of the technical measures presently under consideration are methods of traffic shaping, namely bandwidth capping and bandwidth shaping 2. THE IDENTIFIED EMERGING POLICY RESPONSES 1. INSERT Traffic shaping 2. The UK Parliament is presently considering introducing technical measures to tackle the problem of unlawful peer-to-peer (P2P) file-sharing.

More information

Disk Storage Shortfall

Disk Storage Shortfall Understanding the root cause of the I/O bottleneck November 2010 2 Introduction Many data centers have performance bottlenecks that impact application performance and service delivery to users. These bottlenecks

More information

1. Comments on reviews a. Need to avoid just summarizing web page asks you for:

1. Comments on reviews a. Need to avoid just summarizing web page asks you for: 1. Comments on reviews a. Need to avoid just summarizing web page asks you for: i. A one or two sentence summary of the paper ii. A description of the problem they were trying to solve iii. A summary of

More information

IPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha

IPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha IPTV AND VOD NETWORK ARCHITECTURES Diogo Miguel Mateus Farinha Instituto Superior Técnico Av. Rovisco Pais, 1049-001 Lisboa, Portugal E-mail: diogo.farinha@ist.utl.pt ABSTRACT IPTV and Video on Demand

More information

From Centralization to Distribution: A Comparison of File Sharing Protocols

From Centralization to Distribution: A Comparison of File Sharing Protocols From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015

More information

arxiv:1011.1892v1 [cs.ni] 8 Nov 2010

arxiv:1011.1892v1 [cs.ni] 8 Nov 2010 Pushing Locality to the Limit Stevens Le Blond a, Arnaud Legout a,, Walid Dabbous a a INRIA, EPI Planete, 004 route des lucioles, B.P. 93, 0690 Sophia Antipolis CEDEX, France arxiv:0.89v [cs.ni] 8 Nov

More information

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s) v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best

More information

Peer to peer networking: Main aspects and conclusions from the view of Internet service providers

Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Gerhard Haßlinger, Department of Computer Science, Darmstadt University of Technology, Germany Abstract:

More information

Simulation of Heuristic Usage for Load Balancing In Routing Efficiency

Simulation of Heuristic Usage for Load Balancing In Routing Efficiency Simulation of Heuristic Usage for Load Balancing In Routing Efficiency Nor Musliza Mustafa Fakulti Sains dan Teknologi Maklumat, Kolej Universiti Islam Antarabangsa Selangor normusliza@kuis.edu.my Abstract.

More information

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

A Topology-Aware Relay Lookup Scheme for P2P VoIP System Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme

More information

A Measurement Study of Peer-to-Peer File Sharing Systems

A Measurement Study of Peer-to-Peer File Sharing Systems CSF641 P2P Computing 點 對 點 計 算 A Measurement Study of Peer-to-Peer File Sharing Systems Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble Department of Computer Science and Engineering University

More information

BitTorrent Peer To Peer File Sharing

BitTorrent Peer To Peer File Sharing BitTorrent Peer To Peer File Sharing CS290F: Networking for Multimedia Mini PhD Major Area Exam I) Introduction Content distribution is an important topic in networking and has been evolving from the start

More information

WAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks

WAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks WAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks K. D. Cho et al., IEEE INFOCOM 2012 Workshop, pp. 316-321, March 2012. January 17, 2013 Byeong-Gi Kim Park Laboratory,

More information

Incentives Build Robustness in BitTorrent

Incentives Build Robustness in BitTorrent Incentives Build Robustness in BitTorrent Bram Cohen bram@bitconjurer.org May 22, 2003 Abstract The BitTorrent file distribution system uses tit-fortat as a method of seeking pareto efficiency. It achieves

More information

An Efficient Load Balancing Technology in CDN

An Efficient Load Balancing Technology in CDN Issue 2, Volume 1, 2007 92 An Efficient Load Balancing Technology in CDN YUN BAI 1, BO JIA 2, JIXIANG ZHANG 3, QIANGGUO PU 1, NIKOS MASTORAKIS 4 1 College of Information and Electronic Engineering, University

More information

Evaluating Cooperative Web Caching Protocols for Emerging Network Technologies 1

Evaluating Cooperative Web Caching Protocols for Emerging Network Technologies 1 Evaluating Cooperative Web Caching Protocols for Emerging Network Technologies 1 Christoph Lindemann and Oliver P. Waldhorst University of Dortmund Department of Computer Science August-Schmidt-Str. 12

More information

Characterizing the Query Behavior in Peer-to-Peer File Sharing Systems*

Characterizing the Query Behavior in Peer-to-Peer File Sharing Systems* Characterizing the Query Behavior in Peer-to-Peer File Sharing Systems* Alexander Klemm a Christoph Lindemann a Mary K. Vernon b Oliver P. Waldhorst a ABSTRACT This paper characterizes the query behavior

More information

Modeling an Agent-Based Decentralized File Sharing Network

Modeling an Agent-Based Decentralized File Sharing Network Modeling an Agent-Based Decentralized File Sharing Network Alex Gonopolskiy Benjamin Nash December 18, 2007 Abstract In this paper we propose a distributed file sharing network model. We take inspiration

More information

How To Analyse The Edonkey 2000 File Sharing Network

How To Analyse The Edonkey 2000 File Sharing Network The edonkey File-Sharing Network Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf Steinmetz Multimedia Kommunikation (KOM) Technische Universität Darmstadt Merckstr. 25, 64293 Darmstadt (heckmann, bock,

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Simulating a File-Sharing P2P Network

Simulating a File-Sharing P2P Network Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance

More information

Network Level Multihoming and BGP Challenges

Network Level Multihoming and BGP Challenges Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology jili@cc.hut.fi Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.

More information

ABSTRACT Acknowledgments List of Abbreviations Contents ABSTRACT 3 Acknowledgments 5 List of Abbreviations 7 List of Figures 15 List of Tables 23 1 Introduction 25 2 Motivation and background 29 3 Overview

More information

Deploying in a Distributed Environment

Deploying in a Distributed Environment Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each

More information

On-Demand Media Streaming Over the Internet

On-Demand Media Streaming Over the Internet On-Demand Media Streaming Over the Internet Mohamed M. Hefeeda and Bharat K. Bhargava CERIAS and Department of Computer Sciences Purdue University West Lafayette, IN 47907 {mhefeeda, bb}@cs.purdue.edu

More information

Internet Anonymity and the Design Process - A Practical Approach

Internet Anonymity and the Design Process - A Practical Approach anon.next: A Framework for Privacy in the Next Generation Internet Matthew Wright Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA, mwright@uta.edu,

More information

Experimentation with the YouTube Content Delivery Network (CDN)

Experimentation with the YouTube Content Delivery Network (CDN) Experimentation with the YouTube Content Delivery Network (CDN) Siddharth Rao Department of Computer Science Aalto University, Finland siddharth.rao@aalto.fi Sami Karvonen Department of Computer Science

More information

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

Peer to peer networks: sharing between peers. Trond Aspelund

Peer to peer networks: sharing between peers. Trond Aspelund Peer to peer networks: sharing between peers Trond Aspelund Abstract In this literature survey we look at peer-to-peer networks. We first see how peer-to-peer networks distinguish themselves from the client/server

More information

Peer-to-Peer File Sharing

Peer-to-Peer File Sharing The Effects of File Sharing on a Service Provider's Network An Industry White Paper Copyright July 2002, Sandvine Incorporated www.sandvine.com 408 Albert Street Waterloo, Ontario Canada N2L 3V3 Executive

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

Examining the Impact of the Earthquake on Traffic on a Macro Level

Examining the Impact of the Earthquake on Traffic on a Macro Level 3. Broadband Traffic Report Examining the Impact of the Earthquake on Traffic on a Macro Level The Great East Japan Earthquake in March 2 also caused extensive damage to communications infrastructure.

More information

An apparatus for P2P classification in Netflow traces

An apparatus for P2P classification in Netflow traces An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA

More information

Preparing Your IP Network for High Definition Video Conferencing

Preparing Your IP Network for High Definition Video Conferencing WHITE PAPER Preparing Your IP Network for High Definition Video Conferencing Contents Overview...3 Video Conferencing Bandwidth Demand...3 Bandwidth and QoS...3 Bridge (MCU) Bandwidth Demand...4 Available

More information

The Performance and Locality Tradeoff in BitTorrent-like P2P File-Sharing Systems

The Performance and Locality Tradeoff in BitTorrent-like P2P File-Sharing Systems The Performance and Locality Tradeoff in BitTorrent-like P2P File-Sharing Systems Wei Huang, Chuan Wu, Francis C.M. Lau Department of Computer Science, The University of Hong Kong {whuang,cwu,fcmlau}@cs.hku.hk

More information

The BitTorrent Protocol

The BitTorrent Protocol The BitTorrent Protocol Taken from http://www.cs.uiowa.edu/~ghosh/bittorrent.ppt What is BitTorrent? Efficient content distribution system using file swarming. Usually does not perform all the functions

More information

Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack

Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Jurand Nogiec University of Illinois Fausto Paredes University of Illinois Joana Trindade University of Illinois 1. Introduction BitTorrent

More information

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by

More information

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: medeepusony@gmail.com # K.Meena 2, Assistant Professor

More information

Network congestion control using NetFlow

Network congestion control using NetFlow Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public

The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com Introduction Well understood facts: o Fast is better than slow but it costs more to be fast o Network has to be fast and

More information

Clustering in Peer-to-Peer File Sharing Workloads

Clustering in Peer-to-Peer File Sharing Workloads Clustering in Peer-to-Peer File Sharing Workloads F. Le Fessant, S. Handurukande, A.-M. Kermarrec & L. Massoulié INRIA-Futurs and LIX, Palaiseau, France EPFL, Lausanne, Switzerland Microsoft Research,

More information

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009 HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer

More information

Technical papers Virtual private networks

Technical papers Virtual private networks Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What

More information

Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at

Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at distributing load b. QUESTION: What is the context? i. How

More information

Internet Content Distribution

Internet Content Distribution Internet Content Distribution Chapter 2: Server-Side Techniques (TUD Student Use Only) Chapter Outline Server-side techniques for content distribution Goals Mirrors Server farms Surrogates DNS load balancing

More information

Traceroute-Based Topology Inference without Network Coordinate Estimation

Traceroute-Based Topology Inference without Network Coordinate Estimation Traceroute-Based Topology Inference without Network Coordinate Estimation Xing Jin, Wanqing Tu Department of Computer Science and Engineering The Hong Kong University of Science and Technology Clear Water

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Understanding the Roles of Servers in Large-scale Peer-Assisted Online Storage Systems

Understanding the Roles of Servers in Large-scale Peer-Assisted Online Storage Systems Understanding the Roles of Servers in Large-scale Peer-Assisted Online Storage Systems Fangming Liu, Ye Sun, Bo Li, Xinyan Zhang Hong Kong University of Science & Technology, Roxbeam Inc. Abstract Online

More information

Network Management, Performance Characteristics, and Commercial Terms Policy. (1) mispot's Terms of Service (TOS), viewable at mispot.net.

Network Management, Performance Characteristics, and Commercial Terms Policy. (1) mispot's Terms of Service (TOS), viewable at mispot.net. Network Management, Performance Characteristics, and Commercial Terms Policy Consistent with FCC regulations 1, Agri-Valley Broadband, Inc., d/b/a mispot (mispot) provides this information about our broadband

More information

Should Internet Service Providers Fear Peer-Assisted Content Distribution?

Should Internet Service Providers Fear Peer-Assisted Content Distribution? Should Internet Service Providers Fear Peer-Assisted Content Distribution? Thomas Karagiannis U.C. Riverside Pablo Rodriguez Microsoft Research Konstantina Papagiannaki Intel Research Cambridge Abstract

More information

Is Your Network Ready for VoIP? > White Paper

Is Your Network Ready for VoIP? > White Paper > White Paper Tough Questions, Honest Answers For many years, voice over IP (VoIP) has held the promise of enabling the next generation of voice communications within the enterprise. Unfortunately, its

More information

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar

More information

The Value of a Content Delivery Network

The Value of a Content Delivery Network September 2010 White Paper The Value of a Content Delivery Network Table of Contents Introduction... 3 Performance... 3 The Second Generation of CDNs... 6 Conclusion... 7 About NTT America... 8 Introduction

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Towards a Peer-to-Peer Extended Content Delivery Network

Towards a Peer-to-Peer Extended Content Delivery Network Towards a Peer-to-Peer Extended Content Delivery Network Daniel Pakkala and Juhani Latvakoski VTT Electronics, Kaitoväylä 1, P.O. Box 1100, FIN-90571 Oulu, Finland E-mail: {Daniel.Pakkala, Juhani.Latvakoski}@vtt.fi

More information

Bandwidth Management for Peer-to-Peer Applications

Bandwidth Management for Peer-to-Peer Applications Overview Bandwidth Management for Peer-to-Peer Applications With the increasing proliferation of broadband, more and more users are using Peer-to-Peer (P2P) protocols to share very large files, including

More information

Network Positioning System

Network Positioning System Network Positioning System How service provider infrastructure can support rapid growth of video, cloud and application traffic Stefano Previdi sprevidi@cisco.com Distinguished Engineer Cisco Systems 1

More information

Monitoring Challenges and Approaches for P2P File-Sharing Systems

Monitoring Challenges and Approaches for P2P File-Sharing Systems Monitoring Challenges and Approaches for P2P File-Sharing Systems Danny Hughes Computing, InfoLab21, Lancaster University, Lancaster, UK. +44 (0)1524 510351 danny@comp.lancs.ac.uk James Walkerdine Computing,

More information

IPDR vs. DPI: The Battle for Big Data

IPDR vs. DPI: The Battle for Big Data IPDR vs. DPI: The Battle for Big Data An Incognito White Paper January 2016 2016 Incognito Software Systems Inc. All rights reserved. Contents Summary... 2 IPDR vs. DPI... 3 Overview of IPDR... 3 Overview

More information

A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems

A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands l.dacunto@tudelft.nl

More information

Peer-to-Peer (P2P) applications, including both P2P streaming and P2P

Peer-to-Peer (P2P) applications, including both P2P streaming and P2P Description of Working Group Peer-to-Peer (P2P) applications, including both P2P streaming and P2P file-sharing applications, make up a large fraction of traffic in the Internet today. One way to reduce

More information

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

A Complex Network Structure Design for Load Balancing and Redundant

A Complex Network Structure Design for Load Balancing and Redundant A Complex Network Structure Design for Load Balancing and Redundant Fengming M. Chang Department of Industrial Engineering and Management Tungfang Institute of Technology, Kaohsiung, Taiwan data@nckualumni.org.tw

More information

modeling Network Traffic

modeling Network Traffic Aalborg Universitet Characterization and Modeling of Network Shawky, Ahmed Sherif Mahmoud; Bergheim, Hans ; Ragnarsson, Olafur ; Wranty, Andrzej ; Pedersen, Jens Myrup Published in: Proceedings of 6th

More information

The Challenges of Stopping Illegal Peer-to-Peer File Sharing

The Challenges of Stopping Illegal Peer-to-Peer File Sharing The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:

More information

SE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S.

SE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S. BitTorrent Technology How and why it works SE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S. Kartik Krishnan 1 Abstract BitTorrent

More information

Location Information Services in Mobile Ad Hoc Networks

Location Information Services in Mobile Ad Hoc Networks Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent

More information

Best Practices - Monitoring and Controlling Peer-to-Peer (P2P) Applications

Best Practices - Monitoring and Controlling Peer-to-Peer (P2P) Applications Best Practices - Monitoring and Controlling Peer-to-Peer (P2P) Applications APPLICATION Peer-to-Peer (P2P) EXAMPLES AudioGalaxy, edonkey, BitTorrent, KaZaA, etc. USAGE Locate and exchange (swap) files.

More information

Global Server Load Balancing

Global Server Load Balancing White Paper Overview Many enterprises attempt to scale Web and network capacity by deploying additional servers and increased infrastructure at a single location, but centralized architectures are subject

More information

Oracle Applications Release 10.7 NCA Network Performance for the Enterprise. An Oracle White Paper January 1998

Oracle Applications Release 10.7 NCA Network Performance for the Enterprise. An Oracle White Paper January 1998 Oracle Applications Release 10.7 NCA Network Performance for the Enterprise An Oracle White Paper January 1998 INTRODUCTION Oracle has quickly integrated web technologies into business applications, becoming

More information

Cloud4 User Guide Reliable connectivity for the cloud from Cloud4

Cloud4 User Guide Reliable connectivity for the cloud from Cloud4 Cloud4 User Guide Reliable connectivity for the cloud from Cloud4 Choosing the right broadband for your business If you ve ever shopped around for a good broadband deal for your home then you might have

More information

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.

More information

Revisiting P2P content sharing in wireless ad hoc networks

Revisiting P2P content sharing in wireless ad hoc networks Revisiting P2P content sharing in wireless ad hoc networks Mohamed Karim SBAI, Chadi BARAKAT EPI Planète, INRIA, France Email: {mksbai, cbarakat}@sophia.inria.fr Abstract. Classical content sharing applications

More information

A Link Load Balancing Solution for Multi-Homed Networks

A Link Load Balancing Solution for Multi-Homed Networks A Link Load Balancing Solution for Multi-Homed Networks Overview An increasing number of enterprises are using the Internet for delivering mission-critical content and applications. By maintaining only

More information

In this whitepaper we will analyze traffic for the broadband access services that IIJ operates, and present our findings.

In this whitepaper we will analyze traffic for the broadband access services that IIJ operates, and present our findings. 2 2.1 Introduction In this whitepaper we will analyze traffic for the broadband access services that IIJ operates, and present our findings. It has been reported that growth in Internet traffic levels

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

Three short case studies

Three short case studies Three short case studies peer to peer networking wireless systems search engines each includes issues of hardware processors, storage, peripherals, networks,... representation of information, analog vs.

More information

Scalable Data Collection for Internet-based Digital Government Applications

Scalable Data Collection for Internet-based Digital Government Applications Scalable Data Collection for Internet-based Digital Government Applications [ Appeared in Proceedings of the 1st National Conference on Digital Government Research, 2001 ] W. C. Cheng C.-F. Chou L. Golubchik

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

BEGINNER S GUIDE TO DOWNTIME

BEGINNER S GUIDE TO DOWNTIME BEGINNER S GUIDE TO DOWNTIME DOWNTIME, WHAT IS IT? We talk a lot about the internet running slow or going down but few of us actually know what is happening in those situations. In order to help you get

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

More information

Multimedia transmission in a managed P2P network: making sense?

Multimedia transmission in a managed P2P network: making sense? Multimedia transmission in a managed P2P network: making sense? L. Xu 1, A. Ksentini 2, K. Singh 1, G. Rubino 1, G. Straub 3, Y. L Azou 4 1 INRIA Rennes - Bretagne Atlantique, Rennes, France; 2 IRISA-University

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

Guiding Web Proxy and Server Placement for High Performance Internet Content Delivery 1

Guiding Web Proxy and Server Placement for High Performance Internet Content Delivery 1 Guiding Web Proxy and Server Placement for High Performance Internet Content Delivery 1 Peter Triantafillou (contact author) Department of Computer Engineering and Informatics, University of Patras Rio

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Content Delivery Networks. Shaxun Chen April 21, 2009

Content Delivery Networks. Shaxun Chen April 21, 2009 Content Delivery Networks Shaxun Chen April 21, 2009 Outline Introduction to CDN An Industry Example: Akamai A Research Example: CDN over Mobile Networks Conclusion Outline Introduction to CDN An Industry

More information

Introduction to Dynamic Routing Protocols

Introduction to Dynamic Routing Protocols CHAPTER 3 Introduction to Dynamic Routing Protocols Objectives Upon completion of this chapter, you should be able to answer the following questions: Can you describe the role of dynamic routing protocols

More information

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more

More information

Real-Time Analysis of CDN in an Academic Institute: A Simulation Study

Real-Time Analysis of CDN in an Academic Institute: A Simulation Study Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information