III. ARCHITECTURE JOURNAL OF NETWORKS, VOL. 7, NO. 10, OCTOBER Figure 1. Resource monitoring architecture for P2P IPTV systems.

Size: px
Start display at page:

Download "III. ARCHITECTURE JOURNAL OF NETWORKS, VOL. 7, NO. 10, OCTOBER 2012 1625. Figure 1. Resource monitoring architecture for P2P IPTV systems."

Transcription

1 1624 JOURNAL OF NETWORKS, VOL. 7, NO. 10, OCTOBER 2012 IPTV-RM: A Resources Monitoring Architecture for P2P IPTV Systems Wenxian Wang Network and Trusted Computing Institute, College of Computer Science, Sichuan University, Chengdu, China Institute of Information Security, Sichuan University, Chengdu, China catean@163.com, catean@scu.edu.cn Xingshu Chen and Haizhou Wang Network and Trusted Computing Institute, College of Computer Science, Sichuan University, Chengdu, China chenxsh@scu.edu.cn, whzh.nc@qq.com Abstract Resources monitoring is an important problem of the overall efficient usage and control of P2P IPTV systems. The resources of IPTV can include all distributing servers, programs and peers. Several researches have tried to address this issue, but most of them illuminated P2P traffic characterization, identification and user behavior. The main contributions of this paper are twofold. Firstly, a resources monitoring architecture for P2P IPTV systems, IPTV-RM, was presented based on previous work. The monitoring architecture employs a hierarchical structure and provides systemic monitoring including resources discovery, relative information extraction and analysis, trace and location. It gives a systematic framework for IPTV resources monitoring. Secondly, a distributed program crawling system (DMP-) was first proposed to collect information of programs, and a peer crawling system was put forward to harvest peers of a program. The results show that they are efficient and can be used for resource collection of other P2P system. Index Terms P2P, IPTV, IPTV-RM, Resources Monitoring, I. INTRODUCTION Peer-to-Peer (P2P) applications take advantage of resources such as storage, CPU cycles, content or human presence available at the edge of the Internet in order to provide a service [1]. With the development and maturity of P2P technology, P2P applications become more and more popular in recent ten years, which include filesharing systems, audio-based VOIP systems, and videobased IPTV systems [2-5]. However, they account for a significant proportion of Internet traffic. According to a survey from CacheLogic [6] in June, 2004, 60% of the Internet s traffic is P2P. In Addition, P2P IPTV applications, such as PPLive [2], QQLive [4] in China, Foundation item: Project (2007CB311106) supported by Major State Basic Research Development Program of China; Project ((242)2009A82) supported by Special Plan Program of National Information Security. Corresponding author: Xingshu Chen, Professor of Sichuan University; Tel: ; chenxsh@scu.edu.cn. become popular gradually and contribute a great amount of P2P traffic to Internet [7]. And it was reported that PPLive has more than 200 million user installations and its active monthly user base (as of Dec 2010) is 104 million, i.e., PPLive has a 43% penetration of Chinese internet users [8]. Now P2P IPTV systems are difficult to be monitored because they use proprietary protocols and there are scarcely source codes or official documents published. Monitoring P2P IPTV systems is a critical problem, and several researches have tried to address this issue. But most researches illuminated P2P traffic characterization, identification, system performance and user behavior. This paper proposed IPTV-RM, a resource monitoring architecture for P2P IPTV systems. And the prototype system was developed to monitor popular P2P IPTV systems, such as PPLive, PPStream, UUSee and SopCast. The remainder of this paper is structured as follows: Section II presents relate work of P2P systems monitoring. Section III describes IPTV-RM, a resources monitoring architecture for P2P IPTV systems. Section IV provides implementation of program and peer crawling system. Section V presents monitoring results of program and peer crawling system. Finally, section VI concludes the paper and gives the future work. II. RELATED WORK There have been many studies about P2P systems monitoring. The monitoring approaches they use can be classified in two discrete tracing methods: passive tracing and active tracing. The passive approach is performed by deploying code at suitable points in the network infrastructure. The P2P traffic is identified from general Internet traffic with the known behavior (e.g. connection ports, feature or patterns) of P2P systems. The passive approach does not increase the traffic on the network. Sen et al. developed a signature-based payload methodology to identify P2P traffic [9]. Karagiannis and Broido proposed an identification method based on statistical characterization of P2P traffic flows [10]. Sebastian first introduced a machine learning method to P2P traffic recognition, and doi: /jnw

2 JOURNAL OF NETWORKS, VOL. 7, NO. 10, OCTOBER used the unsupervised Bayesian learning algorithm for traffic classification [11]. After that, several P2P traffic identification algorithms based on machine learning were proposed [12], such as semi-supervised clustering algorithm, decision tree algorithm, neural network algorithm and support vector machine. The passive approach is potentially transparent, scalable and allows comparison of traffic from multiple domains side-by-side. However, it is dependent upon access to core network infrastructure, which is not always feasible. So it is often used for flow control in firewall or gateway devices. The active approach relies on special crawler to inject test packets into P2P network or send packets to servers and peers, following them and measuring characters of P2P network. Saroiu et al. performed the first active tracing of the Gnutella and Napster Network [13]. They sought to precisely characterize the population of enduser hosts that participate in these two systems. Ripneau et al. developed a crawler that joined the Gnutella network as a servant and used the membership protocol (the PING-PONG mechanism) to collect topology information [14]. From then on, many studies based active method were performed on P2P file sharing system such as BitTorrent, Kazaa and emule. P2P IPTV technology has been restricted by low broadband penetration in the past; however, the rapid and large-scale popularization of broadband technology makes it possible to become the next disruptive IP communication technology, which will greatly revolutionize the people s lives and entertainment [15]. There have been several IPTV applications raised and gained great success commercially, including CoolStreaming [16], PPTV [2], PPStream [3], SopCast [17] and so on. And these IPTV systems draw people s attention, including research fellow. Hei et al. carried out the first active tracing of a commercial P2P IPTV system, namely, PPLive [18]. They further developed a dedicated PPLive crawler to study the global characteristics of PPLive system [19]. Wu et al. presented Magellan to characterize topologies of peer-to-peer streaming networks of UUSee [20]. Vu et al. mapped the PPLive Network to study the impacts of media streaming on P2P overlays [21, 28, 29]. Most of the previous work was performed from a single view of observation or from few nodes within direct access and lacked an automatic system for executing measurements and monitoring. These studies tended to mainly look at either network-centric metrics (e.g., traffic characterization, TCP or UDP connections, video traffic), or user-centric metrics (e.g., user arrival and departure, geographic distribution, channel population). Our studies focused primarily on systemic architecture for resources monitoring, including resources discovery, relative information extraction and analysis, trace and location. And a distributed program crawling system (DMP-) was first proposed to collect various information of programs. III. ARCHITECTURE As shown in Fig. 1, IPTV-RM, the architecture for P2P IPTV system resources monitoring, includes four main components: Task Scheduling Center which allocating various tasks to servers, Information Collector which collects information of relative websites, distributing servers and programs from network, Data Processor which filters and analyzes information obtained by collector, and Monitor Dashboard which performs system management, query, report and monitoring. Figure 1. Resource monitoring architecture for P2P IPTV systems. A. Task Scheduling Center Task Scheduling Center allocates various tasks to servers. As the task scheduling and load balancing is a NP complete problem in a distributed computing environment, fuzzy control theory is introduced to the distributed task scheduling. We proposed a new fuzzy scheduling algorithm based on the fuzzy control theory and task request quality of service [22]. While allocating tasks by the algorithm, the center can choose the best server node to execute every task, maximize the processing capacity of each node, and keep the load of each node in relative balance, especially in the case of large number of tasks. B. Information Collector Information Collector collects information of IPTV websites, distributing servers and programs from Internet and IPTV overlay network. It contains three modules: Websites Discovery, Severs Discovery and. Websites Discovery module is based on a focused crawler [23] which is designed to search relative IPTV systems websites and to collect various information, such as homepage, IP address and ICP license. Through statistic analysis of captured raw packets of communication between peers and servers, Servers Discovery module can grab information of distributing servers like program-list servers, media distributing servers and peer list servers module includes two kinds of special crawlers, namely, program crawler and peer crawler. A program crawler is a disguised IPTV client. It requests program information (e.g. Name, bitrate, description, play-link) from program-list servers. While a peer crawler is used to collect participating peers in the same program.

3 1626 JOURNAL OF NETWORKS, VOL. 7, NO. 10, OCTOBER 2012 C. Data Processor Data Processor includes four modules: Data Filtering, Data Repository, Data Analysis and Storage. All the data obtained by Information Collector are filtered and stored in Data Repository. Data Filter module is mainly used for programs classification and sensitive programs marking through text-based analysis technologies. Data Analysis module is used for statistics and features analysis, which can be used to predict propagation speed and trend of popular programs. The purpose of Storage module is to store records of specified programs. With Data Processor, the monitoring system is able to automatically associate data with a given reference point (time, location, ICP, etc.) and to categorize the programs that are popular. The continuous trace of a program can also be built up to determine how a program is being distributed across various IPTV network by peer crawler. D. Monitor Dashboard Monitor Dashboard includes four modules: System Management, Resource Location, Query and Report, and Monitoring. System Management module is in charge of administration of monitoring system, and includes fault management, configuration management, performance management and security management. Through configuration management, the administrator can easily start or terminate various crawlers at regular time. Resource Location module is based on IP-to-location database like MaxMind [24]. This module can display location of distributing server or peers in a worldwide map. Query and Report module provides easy interface for query and generates statistic reports (e.g. statistical figures, spreadsheets). Monitoring modules is used for trace, record and pollution attack of popular or sensitive programs. Peer crawler mentioned previously can perform trace of a program. A program can be recorded, converted and saved as a video file by FFmpeg [25]. Pollution attack of a program is conducted by a dedicated crawler developed by us [15]. The results show that a single polluter is capable of compromising the whole system and its destructiveness is severe. IV. IMPLEMENTATION Fig. 2 briefly outlines the basic processes of data. First, a focused crawler [23] is designed to collect information of the IPTV systems websites. In addition, program crawler and peer crawler, based on principle of IPTV protocols through passive trace and reverse engineering technology, are developed to obtain information of distributing servers, peers and programs. Then the information is filtered and stored in data repository and is further analyzed and classified. According the command of monitor dashboard, trace of some program is carried out by a few peer crawlers, which can collect viewing peers information (e.g., IP address, TCP number) in a period of time. Figure 2. Processes of data. A. Program Crawling Program-list distribution is very important in IPTV systems. When a client starts up, it requests program-list file from program-list servers and updates the information of programs immediately. The list of program includes program name, program play-link which is the most important identification of signal communication among peers, program descriptions and so on. The client-server architecture is usually adopted to distribute program-list file in IPTV systems, as shown in Fig. 3. The program-list file uses XML to organize various properties of programs. With the number of programs increasing rapidly, the size of program-list file becomes bigger and bigger. For example, PPLive had about 300 thousand programs in 2010, and the size of program-list file was more than 20MB. That is a heavy burden to servers, and makes bad experience to users. Some IPTV systems use compression to decrease the file size, and others use multiple programlist files. Figure 3. Program-list distribution architecture of IPTV. An efficient Distributed Multi-Protocol System (DMP-) was proposed to obtain various information of programs in popular IPTV systems. We used {program name, IPTV protocol} to uniquely identify a program. Fig. 4 presents an overview of the program crawler system architecture. On the basis of crawler clients status, the crawler controller assigns tasks to multiple independent crawler clients. Each crawler client periodically reports its crawling status, CPU and memory consumption to crawler controller.

4 JOURNAL OF NETWORKS, VOL. 7, NO. 10, OCTOBER CPUs and 1GB Memory at Sichuan University of China with 10/100Mbps Ethernet network access. The detailed distributed peer crawler system architecture is plotted in Fig. 6. Controller Database Host Host Host... Process Process Process Crawling Thread Crawling Thread Crawling Thread P2P IPTV Network Figure 4. Distributed multi-protocol crawler system. According to crawling task type, the crawler client invokes Engine, requests program-list file from program-list servers and reports crawling status to crawler controller. When program-list file is downloaded, the crawler client extracts metadata of programs from the file, classifies these programs and stores all information in database. B. Peer Crawling Fig. 5 illustrates the procedures that a peer crawler joins the IPTV network to harvest peers [50]. Figure 5. Workflow of peer crawler. (1) the peer crawler requests the latest program file from program-list servers and updates it immediately; (2) after the peer crawler selects one program to watch, it registers itself in the peer-list servers (tracker servers) and sends out multiple query messages, generally five, to the servers to retrieve a small set of peers that are watching the same program; (3) upon receiving the initial list of peers, the peer crawler uses this seed peer list to harvest additional lists by periodically probing active peers which maintain a list of peers. From the knowledge of the measurement studies for P2P file sharing system presented in [26], the accuracy of captured overlay snapshots depends on the crawling speed because of the high dynamic nature of P2P overlay network. Therefore, we developed a fast and efficient distributed peer crawler system (Peer-), which can capture significantly more accurate snapshots of the IPTV overlay network than previous crawlers [19, 27]. In our experiment, the distributed crawler system was deployed on six PCs with two 2.60GHz Pentium (R) Peer Peer Figure 6. Distributed peer crawler system. controller: The crawler controller accepts play-link of a program as input argument of crawling startup, and then constructs query messages for retrieving peer-list from peer-list servers or partner peers. At the beginning of crawling, the crawler controller implement step 2 of Fig. 5 to retrieve the initial set of peers and then coordinates among multiple independent crawler hosts. In more detail, the crawler controller assigns part of the initial peers to each crawler host and waits for the crawling results from them by using asynchronous communications. Each crawler host then probes these seed peers to harvest additional peer lists and reports crawling results to crawler controller. The distributed crawler system uses adaptive scheduling algorithm to ensure each crawler host remain busy, which is of crucial importance for making full use of the heterogeneous processing capabilities of various crawler hosts. host: After receiving seed peers from crawler controller, each crawler host implements step 3 of Fig. 5 to harvest peer-list in parallel. Upon accomplishing the mission for tracing seed peers, the crawler host then reports crawling results to crawler controller and wait for new missions. hosts are independent crawlers to explore different parts of single program overlay network. Additionally, to achieve a high degree of concurrency, each crawler process creates multiple crawling threads that can independently harvest peer lists from ITV overlay network. C. Peer Crawling Performance Owing to the mismatch between the arrival and departure lags [19], the peer number of crawling results may overestimate the real active peers. Moreover, it is a challenge for Peer- to probe all the peers due to network congestion and NAT problem, which may not respond to peer-list requests at all. According to the resource distribution mechanism of IPTV system, we can harvest almost all the peers information from peer-list servers and partner peers depending on appropriate measurement intervals. To present Peer- performance in speed and efficiency of capturing IPTV

5 1628 JOURNAL OF NETWORKS, VOL. 7, NO. 10, OCTOBER 2012 overlay snapshots, several notations were used to evaluate the completeness of crawling results and efficiency of Peer-. The notations are listed in Table I. TABLE I. THE NOTIONS Symbol Explanation for Symbols Δ t the interval of sending peer-list request T the overall time of crawling program N the actual peer number of program overlay network N the peer number of program overlay network which harvested by crawlers μ t the number of peers which harvested by crawlers at time t ρ the completeness of crawling results ψ the efficiency of crawler system From the above crawling workflow proposed by us, we can know that: μt+δ t μt lim = 0. (1) t T Δt The completeness of crawling results ρ is defined as follow: ρ = N N. (2) It is impossible for Peer- to obtain the precise number of peers in program overlay network, because just only the IPTV providers can know this information by their own platform. However, we can obtain this approximate number by setting appropriate measurement intervals in our experiment. With the method of curve fitting, we discovered a certain quadratic functional relationship between Δ t and T as follow: T 2 = α( Δt) + β Δt γ. (3) + Consequently, we defined the efficiency of Peer- as follow: ρ N N ψ = = =. (4) 2 T N T N ( α( Δt) + β Δt + γ ) That is, the efficiency of Peer- will increase with the reduction of Δ t. Therefore, we implemented a comparative experiment by setting Δ t as 0ms, 1ms, 2ms, 3ms, 5ms and 10ms respectively to choose a suitable parameter. We presented how the number of the participating users evolves for a very popular program with the different intervals of sending peer-list request, as shown in Fig. 7. From the experiment results shown in Fig. 7, we can observe that: (1) If Δ t =0ms, the process of crawling stops within 10 seconds, however, the crawler can only harvest about 2000 peers which has a large deviation compared with the real value. (2) As the value of Δ t increases, the overall crawling time is also growing. (3) When Δ t =1ms or Δ t =2ms, the crawling time of two situations are both about 38 seconds, but the later reaches faster convergence rate than the former. (4) As for Δ t =10ms, the process of crawling lasts about 94 seconds, which is too long time to capture accurate overlay snapshots. Consequently, we concluded that Δ t =2ms is the most valuable interval of sending peer-list request to archive more accurate and complete crawling results with relatively shorter period. Figure 7. Program-list distribution architecture of IPTV V. RESULTS A. Program Crawling The program crawling system was developed in December 2008 and was made of one Controller and ten Clients. The system was deployed on three PC Servers with Intel E5506 CPU and 4GB Memory at Beijing of China with 10Mbps Ethernet network access. From February 2009 to December 2010, the program crawling system collected resources from 28 IPTV systems in China, and obtained 7, 679, 331 program information, in which the proportion of videos on demand is 99.6%. In particular, PPfilm has no live program. Fig. 8 shows program s percent of IPTV systems. PPTV has 25.6 percent programs, while PPfilm has 20.8 percent programs. Figure 8. Program s percent of IPTV systems. We ranked each of the IPTV systems according to their number of program and plotted a typical Cumulative Distribution Function (CDF) of program s percent in Fig. 9. The 21.4% (6/28) popular IPTV systems count for about 80% programs. The 32.1% (9/28) popular IPTV systems have more than 90% programs. Some IPTV systems, like SopCast and TVUPlayer, have only a small proportion of programs, for they have no videos on demand.

6 JOURNAL OF NETWORKS, VOL. 7, NO. 10, OCTOBER Figure 9. CDF of program s percent. B. Peer Crawling A popular channel named My Own Swordsmen was chosen for the experiment because this program has a clear diurnal trend of the evolution of peers viewing program. Fig. 10 shows the peer participation evolution. In Fig. 10, the curves of the number of peers are very similar during the seven measurement days. The daily peers remain with a constant diurnal viewing pattern. The major peaks appear at 1PM and 10PM in one day. This might suggest that P2P IPTV users have different viewing habits from TV audiences. Figure 10. Evolution of the number of simultaneous users (March 10 to March 16, 2008). Fig. 11 and Fig 12 present how the number of participating users evolves for a popular and an unpopular program. Note that the number of participating users of popular program differs greatly from that of unpopular program. The maximum and mean numbers of users of the popular program are 3224 and 1675 respectively; however, those of the unpopular program are only 268 and 100. Figure 11. Diurnal trend of number of participating users of popular program ( My Own Swordsmen, March 10, 2008). Figure 12. Diurnal trend of number of participating users of unpopular program ( Sex and the City, March 10, 2008). VI. CONCLUSION AND FUTURE WORK With the popularity of P2P IPTV systems, it is necessary to monitor information in their overlay for security issue. Based on previous work [48-50, 54], we outline IPTV-RM, a resources monitoring architecture for P2P IPTV System, primarily addressing hierarchical structure and collector. It gives a systematic frame work for IPTV resources monitoring. In addition, Distributed Multi-Protocol System and Peer- system are proposed. To date an IPTV monitoring prototype system has been developed. This monitoring system carries out its monitoring activity using active monitoring. The monitoring system have collected more than 7 million programs. We can trace a program by Peer- system. In the next work, we focus on other monitoring methods and analysis of programs. ACKNOWLEDGMENT This work was supported by Major State Basic Research Development Program of China ( 973 Program) (Number 2007CB311106) and Special Plan Program of National Information Security (Number (242)2009A82). The research presented in this paper would not have been possible without our institutes, at Sichuan University, Chengdu. We wish to thank the reviewers for their valuable suggestions. REFERENCES [1] D. Hughes, J. Walkerdine and K. Lee, Monitoring Challenges and Approaches for P2P File-Sharing Systems, in First International Conference on Internet Surveillance and Protection (ICISP 06), Cap Esterel, Cote d Azur, France. USA: IEEE Press, [2] The PPTV (former PPLive) Homepage. [ ]. http: // [3] The PPStream Homepage. [ ]. http: // [4] The Tencent video (former QQLive) Homepage [EB/OL]. [ ]. http: //v.qq.com/. [5] The UUSee Homepage. [ ]. http: // [6] True Picture of P2P Filesharing. [ ]. [Online]. Available: http: // [7] R. Wang, Y. Liu, Y. Yang et al., Solving the App-Level Classification Problem of P2P Traffic Via Optimized

7 1630 JOURNAL OF NETWORKS, VOL. 7, NO. 10, OCTOBER 2012 Support Vector Machines, in Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA'06), 2006, Vol. 2, pp [8] The Synacast Homepage. [ ]. http: // [9] S. Sen, O. Spatscheck and D. M. Wang, Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures, in Proceedings of the 13th international conference on World Wide Web (WWW2004), New York, USA, [Online]. Available: http: //www2004.org/proceedings/docs/1p512.pdf. [10] T. Karagiannis and A. Broido, Transport Layer Identification of P2P Traffic, in Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, Sicily, Italy. USA: ACM, 2004, pp [11] S. Zander and T. Nguyen, Automated traffic classification and application identification using machine learning, in Proceedings of the IEEE Conference on Local Computer Networks 30th Anniversary. Sydney, NSW. USA: IEEE Press, 2005, pp [12] H. Liu, W. Feng, Y.g Huang, et al., A Peer-To-Peer Traffic Identification Method Using Machine Learning, in International Conference on Networking, Architecture, and Storage (NAS 2007), IEEE Press, July 2007, pp [13] S. Saroiu, P. Gummadi, and S. D. Gribble, A Measurement Study of Peer-to-Peer File Sharing Systems, in Tech. Report UW-CSE , Dept. of Computer Science and Eng., UniV. of Washington, Seattle, July [14] M. Ripeani, A. Iamnitchi, and I. Foster, Mapping the Gnutella Network, IEEE Internet Computing, vol. 6, no. 1, pp , [15] H. Wang, X. Chen, W. Wang, A Measurement Study of Polluting a Large-Scale P2P IPTV System, China Communications, Vol. 8, No. 2, pp , [16] X. Zhang, J. Liu, B. Li et al., DONet/CoolStreaming: A Data-driven Overlay Network for Peer-to-Peer Live Media Streaming, in Proceedings of 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Miami, FL. USA: IEEE Press, 2005, pp [17] The SopCast Homepage. [ ]. http: // [18] X. Hei, C. Liang, J. Liang, Y. Liu, and K. W. Ross, Insight into PPLive: Measurement Study of a Large Scale P2P IPTV System, in IPTV workshop in conjunction with WWW2006, May [Online]. Available: http: //cis.poly.edu/ross/papers/ppliveworkshop.pdf. [19] X. Hei, C. Liang, J. Liang, Y. Liu, and K. W. Ross, A Measurement Study of a Large-scale P2P IPTV System, IEEE Transactions on Multimedia, Vol. 9, No. 8, pp , [20] C. Wu, B Li, and S. Zhao, Exploring Large-scale Peer-to- Peer Live Streaming Topologies, ACM Transactions on Multimedia Computer Communication Applications, Vol. 4, No. 3, pp. 1-23, [21] L. Vu, I. Gupta, J. Liang, and K. Nahrstedt, Measurement of a Large-scale Overlay for Multimedia Streaming, in Proceedings of the 16th International Symposium on High Performance Distributed Computing (HPDC 07), Monterey Bay, CA, USA. USA: IEEE Press, June 2007, pp [Online]. Available: http: //cairo.cs.uiuc.edu/publications/papers/hpdc-poster.pdf. [22] Y. Duan, X. Chen, and W. Wang, The Research of distributed task scheduling algorithm based on Fuzzy Control, in Proceedings of International Conference on Information Security and Artificial Intelligence (ISAI 2010), Chengdu, China. USA: IEEE Press, 2010, pp [23] W. Wang, X. Chen, and H. Wang, A focused crawler based on naive Bayes classifier, in Proceedings of the Third International symposium on Intelligent Information Technology and Security Informatics (IITSI 2010), Jinggangshan, China. USA: IEEE Press, 2010, pp [24] The MaxMind Free Geolocation Database Homepage. [ ] http: // [25] The FFmpeg Homepage. [ ]. http: //ffmpeg.org/. [26] D. Stutzbach and R. Rejaie, Capturing Accurate Snapshots of the Gnutella Network, in 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2005), Miami, FL, USA. USA: IEEE Press, 2005, pp [27] L. Vu, I. Gupta, K. Nahrstedt, et al., Understanding overlay characteristics of a large-scale peer-to-peer IPTV system, ACM Transactions on Multimedia Computing, Communications and Applications, Vol. 6, No. 4, pp , [28] R. Zhu, J. Wang, Power-Efficient Spatial Reusable Channel Assignment Scheme in WLAN Mesh Networks, Mobile Networks and Applications, vol. 17, no. 1. pp , [29] R. Zhu, Intelligent Rate Control for Supporting Real-time Traffic in WLAN Mesh Networks, Journal of Network and Computer Applications, vol. 34, no. 5, pp , Wenxian Wang was born in Jinjiang of Fujian province of China in He received his M.E. degrees from College of Chemical Engineering, Sichuan University, China, in He is a lecturer of Network and Trusted Computing Institute, and is currently a Ph.D. candidate at the Institute of Information Security, Sichuan University. He is a member of the International Association of Computer Science and Information Technology (IACSIT). He took part in project Key Technology of P2P Applications Monitoring System, awarded Scientific and Technological Progress Second-class Award of Sichuan Province of China in September His research interests include peer-to-peer networks, information security and trusted computing. Xingshu Chen was born in She received her M.S. degree from College of Computer Science of Sichuan University, Chengdu, China, in 2000 and Ph.D. degree from Institute of Information Security at Sichuan University, Chengdu, China, in From 2005 to 2010, she was with College of Computer Science as an assistant professor, working with teaching and research. Currently, she is a professor and Ph.D. supervisor of College of Computer Science. She is currently the director of Network and Trusted Computing Institute (NTCI) and vice director of Information Management Center. She awarded Scientific and Technological Progress Second-class Award of Sichuan Province of China in September Her general research interests include peer-to-peer networks, information security, computer networks and cloud computing. Haizhou Wang was born in He received his B.E. degrees from College of Computer Science, Sichuan University, China, in He is currently working toward the Ph.D. degree at the same University. He awarded Outstanding Graduate Student of Sichuan University twice in 2009 and 2010, and 3rd Prize in 2010 NVIDIA CUDA Collegiate Programming Contest of China. His research interests include peer-to-peer IPTV systems, information security, and network measurement.

Using UDP Packets to Detect P2P File Sharing

Using UDP Packets to Detect P2P File Sharing 188 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 27 Using UDP Packets to Detect P2P File Sharing Tsang-Long Pao and Jian-Bo Chen Tatung University, Taipei,

More information

A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems

A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands l.dacunto@tudelft.nl

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

1672 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 9, NO. 8, DECEMBER 2007

1672 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 9, NO. 8, DECEMBER 2007 1672 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 9, NO. 8, DECEMBER 2007 A Measurement Study of a Large-Scale P2P IPTV System Xiaojun Hei, Student Member, IEEE, Chao Liang, Student Member, IEEE, Jian Liang,

More information

On the Penetration of Business Networks by P2P File Sharing

On the Penetration of Business Networks by P2P File Sharing On the Penetration of Business Networks by P2P File Sharing Kevin Lee School of Computer Science, University of Manchester, Manchester, M13 9PL, UK. +44 (0) 161 2756132 klee@cs.man.ac.uk Danny Hughes Computing,

More information

A Measurement Study of Peer-to-Peer File Sharing Systems

A Measurement Study of Peer-to-Peer File Sharing Systems CSF641 P2P Computing 點 對 點 計 算 A Measurement Study of Peer-to-Peer File Sharing Systems Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble Department of Computer Science and Engineering University

More information

Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic

Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic William Acosta and Surendar Chandra University of Notre Dame, Notre Dame IN, 46556, USA {wacosta,surendar}@cse.nd.edu Abstract.

More information

A Survey Study on Monitoring Service for Grid

A Survey Study on Monitoring Service for Grid A Survey Study on Monitoring Service for Grid Erkang You erkyou@indiana.edu ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide

More information

A. Related Measurement Work on Mesh-pull Streaming Systems

A. Related Measurement Work on Mesh-pull Streaming Systems Inferring Network-Wide Quality in P2P Live Streaming Systems Xiaojun Hei, Yong Liu and Keith W. Ross Department of Computer and Information Science Department of Electrical and Computer Engineering Polytechnic

More information

On the Penetration of Business Networks by P2P File Sharing

On the Penetration of Business Networks by P2P File Sharing On the Penetration of Business Networks by P2P File Sharing Kevin Lee School of Computer Science, University of Manchester, Manchester, UK. +44 () 161 2756132 klee@cs.man.ac.uk Danny Hughes Computing,

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

An Efficient Hybrid P2P MMOG Cloud Architecture for Dynamic Load Management. Ginhung Wang, Kuochen Wang

An Efficient Hybrid P2P MMOG Cloud Architecture for Dynamic Load Management. Ginhung Wang, Kuochen Wang 1 An Efficient Hybrid MMOG Cloud Architecture for Dynamic Load Management Ginhung Wang, Kuochen Wang Abstract- In recent years, massively multiplayer online games (MMOGs) become more and more popular.

More information

Encrypted Internet Traffic Classification Method based on Host Behavior

Encrypted Internet Traffic Classification Method based on Host Behavior Encrypted Internet Traffic Classification Method based on Host Behavior 1,* Chengjie GU, 1 Shunyi ZHANG, 2 Xiaozhen XUE 1 Institute of Information Network Technology, Nanjing University of Posts and Telecommunications,

More information

CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES

CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES 1 MYOUNGJIN KIM, 2 CUI YUN, 3 SEUNGHO HAN, 4 HANKU LEE 1,2,3,4 Department of Internet & Multimedia Engineering,

More information

Peer-to-Peer: an Enabling Technology for Next-Generation E-learning

Peer-to-Peer: an Enabling Technology for Next-Generation E-learning Peer-to-Peer: an Enabling Technology for Next-Generation E-learning Aleksander Bu lkowski 1, Edward Nawarecki 1, and Andrzej Duda 2 1 AGH University of Science and Technology, Dept. Of Computer Science,

More information

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab

More information

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT Soumya V L 1 and Anirban Basu 2 1 Dept of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, India

More information

A Network Monitoring System with a Peer-to-Peer Architecture

A Network Monitoring System with a Peer-to-Peer Architecture A Network Monitoring System with a Peer-to-Peer Architecture Paulo Salvador, Rui Valadas University of Aveiro / Institute of Telecommunications Aveiro E-mail: salvador@av.it.pt; rv@det.ua.pt Abstract The

More information

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390 The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May

More information

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster , pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

The Big Data methodology in computer vision systems

The Big Data methodology in computer vision systems The Big Data methodology in computer vision systems Popov S.B. Samara State Aerospace University, Image Processing Systems Institute, Russian Academy of Sciences Abstract. I consider the advantages of

More information

How To Classify Network Traffic In Real Time

How To Classify Network Traffic In Real Time 22 Approaching Real-time Network Traffic Classification ISSN 1470-5559 Wei Li, Kaysar Abdin, Robert Dann and Andrew Moore RR-06-12 October 2006 Department of Computer Science Approaching Real-time Network

More information

New Cloud Computing Network Architecture Directed At Multimedia

New Cloud Computing Network Architecture Directed At Multimedia 2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.16 New Cloud Computing Network

More information

From Centralization to Distribution: A Comparison of File Sharing Protocols

From Centralization to Distribution: A Comparison of File Sharing Protocols From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015

More information

Clustering in Peer-to-Peer File Sharing Workloads

Clustering in Peer-to-Peer File Sharing Workloads Clustering in Peer-to-Peer File Sharing Workloads F. Le Fessant, S. Handurukande, A.-M. Kermarrec & L. Massoulié INRIA-Futurs and LIX, Palaiseau, France Distributed Programming Laboratory, EPFL, Switzerland

More information

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu Dilip Kumar Krishnappa, Samamon Khemmarat, Lixin Gao, Michael Zink University of Massachusetts Amherst,

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

Bandwidth Management for Peer-to-Peer Applications

Bandwidth Management for Peer-to-Peer Applications Overview Bandwidth Management for Peer-to-Peer Applications With the increasing proliferation of broadband, more and more users are using Peer-to-Peer (P2P) protocols to share very large files, including

More information

Impact of Peer Incentives on the Dissemination of Polluted Content

Impact of Peer Incentives on the Dissemination of Polluted Content Impact of Peer Incentives on the Dissemination of Polluted Content Fabricio Benevenuto fabricio@dcc.ufmg.br Virgilio Almeida virgilio@dcc.ufmg.br Cristiano Costa krusty@dcc.ufmg.br Jussara Almeida jussara@dcc.ufmg.br

More information

Comparative Traffic Analysis Study of Popular Applications

Comparative Traffic Analysis Study of Popular Applications Comparative Traffic Analysis Study of Popular Applications Zoltán Móczár and Sándor Molnár High Speed Networks Laboratory Dept. of Telecommunications and Media Informatics Budapest Univ. of Technology

More information

Mobile Storage and Search Engine of Information Oriented to Food Cloud

Mobile Storage and Search Engine of Information Oriented to Food Cloud Advance Journal of Food Science and Technology 5(10): 1331-1336, 2013 ISSN: 2042-4868; e-issn: 2042-4876 Maxwell Scientific Organization, 2013 Submitted: May 29, 2013 Accepted: July 04, 2013 Published:

More information

Simulating a File-Sharing P2P Network

Simulating a File-Sharing P2P Network Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance

More information

Internet Video Streaming and Cloud-based Multimedia Applications. Outline

Internet Video Streaming and Cloud-based Multimedia Applications. Outline Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, yhe@ee.ryerson.ca Ling Guan, lguan@ee.ryerson.ca 1 Outline Internet video streaming Overview Video coding Approaches for video

More information

Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392. Research Article. E-commerce recommendation system on cloud computing

Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392. Research Article. E-commerce recommendation system on cloud computing Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 E-commerce recommendation system on cloud computing

More information

AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA

AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA Ms. M. Kiruthika Asst. Professor, Fr.C.R.I.T, Vashi, Navi Mumbai. venkatr20032002@gmail.com Ms. Smita Dange Lecturer,

More information

A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming

A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming Chin Yong Goh 1,Hui Shyong Yeo 1, Hyotaek Lim 1 1 Dongseo University Busan, 617-716, South Korea cgnicky@gmail.com, hui_shyong@hotmail.com,

More information

Classifying P2P Activity in Netflow Records: A Case Study on BitTorrent

Classifying P2P Activity in Netflow Records: A Case Study on BitTorrent IEEE ICC 2013 - Communication Software and Services Symposium 1 Classifying P2P Activity in Netflow Records: A Case Study on BitTorrent Ahmed Bashir 1, Changcheng Huang 1, Biswajit Nandy 2, Nabil Seddigh

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

On the impact of the initial peer list in P2P live streaming applications: the case of Sopcast

On the impact of the initial peer list in P2P live streaming applications: the case of Sopcast Universal Journal of Communications and Network 1(4): 142-15, 213 DOI: 1.13189/ujcn.213.143 http://www.hrpub.org On the impact of the initial peer list in P2P live streaming applications: the case of Sopcast

More information

Research on Errors of Utilized Bandwidth Measured by NetFlow

Research on Errors of Utilized Bandwidth Measured by NetFlow Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic

More information

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks 2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh

More information

A Network Simulation Experiment of WAN Based on OPNET

A Network Simulation Experiment of WAN Based on OPNET A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2

More information

Clustering in Peer-to-Peer File Sharing Workloads

Clustering in Peer-to-Peer File Sharing Workloads Clustering in Peer-to-Peer File Sharing Workloads F. Le Fessant, S. Handurukande, A.-M. Kermarrec & L. Massoulié INRIA-Futurs and LIX, Palaiseau, France EPFL, Lausanne, Switzerland Microsoft Research,

More information

An Architecture Model of Sensor Information System Based on Cloud Computing

An Architecture Model of Sensor Information System Based on Cloud Computing An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National

More information

5 Applied Machine Learning Theory

5 Applied Machine Learning Theory 5 Applied Machine Learning Theory 5-1 Monitoring and Analysis of Network Traffic in P2P Environment BAN Tao, ANDO Ruo, and KADOBAYASHI Youki Recent statistical studies on telecommunication networks outline

More information

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

An apparatus for P2P classification in Netflow traces

An apparatus for P2P classification in Netflow traces An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA

More information

Introduction: Why do we need computer networks?

Introduction: Why do we need computer networks? Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February

More information

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,

More information

Monitoring Challenges and Approaches for P2P File-Sharing Systems

Monitoring Challenges and Approaches for P2P File-Sharing Systems Monitoring Challenges and Approaches for P2P File-Sharing Systems Danny Hughes Computing, InfoLab21, Lancaster University, Lancaster, UK. +44 (0)1524 510351 danny@comp.lancs.ac.uk James Walkerdine Computing,

More information

Understanding the Roles of Servers in Large-scale Peer-Assisted Online Storage Systems

Understanding the Roles of Servers in Large-scale Peer-Assisted Online Storage Systems Understanding the Roles of Servers in Large-scale Peer-Assisted Online Storage Systems Fangming Liu, Ye Sun, Bo Li, Xinyan Zhang Hong Kong University of Science & Technology, Roxbeam Inc. Abstract Online

More information

Reciprocity with Virtual Nodes: Supporting Mobile Nodes in Peer-to- Peer Content Distribution

Reciprocity with Virtual Nodes: Supporting Mobile Nodes in Peer-to- Peer Content Distribution Reciprocity with Virtual Nodes: Supporting Mobile Nodes in Peer-to- Peer Content Distribution CNSM/SETM Workshop 18.10.2013, Zürich, Switzerland Dipl.-Wirtsch.-Inform. Matthias Wichtlhuber mwichtlh@ps.tu-darmstadt.de

More information

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

A Topology-Aware Relay Lookup Scheme for P2P VoIP System Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme

More information

A Proxy-based Architecture for Multimedia Transmission

A Proxy-based Architecture for Multimedia Transmission Proceedings of the 8th WSEAS International Conference on Automation and Information, Vancouver, Canada, June 19-21, 2007 322 A Proxy-based Architecture for Multimedia Transmission WANG DA-ZHEN [1,2], WAN

More information

ATCM: A Novel Agent-based Peer-to-Peer Traffic Control Management

ATCM: A Novel Agent-based Peer-to-Peer Traffic Control Management Journal of Computational Information Systems 7: 7 (2011) 2307-2314 Available at http://www.jofcis.com ATCM: A Novel Agent-based Peer-to-Peer Traffic Control Management He XU 1,, Suoping WANG 2, Ruchuan

More information

A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer

A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer Technology in Streaming Media College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China shuwanneng@yahoo.com.cn

More information

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP This Conference or Workshop Item Adda, Mo, Kasassbeh, M and Peart, Amanda (2005) A survey of network fault management. In: Telecommunications

More information

Transparent Optimization of Grid Server Selection with Real-Time Passive Network Measurements. Marcia Zangrilli and Bruce Lowekamp

Transparent Optimization of Grid Server Selection with Real-Time Passive Network Measurements. Marcia Zangrilli and Bruce Lowekamp Transparent Optimization of Grid Server Selection with Real-Time Passive Network Measurements Marcia Zangrilli and Bruce Lowekamp Overview Grid Services Grid resources modeled as services Define interface

More information

PEER-TO-PEER NETWORK

PEER-TO-PEER NETWORK PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Method of Fault Detection in Cloud Computing Systems

Method of Fault Detection in Cloud Computing Systems , pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,

More information

An Open Tracing System for P2P File Sharing Systems

An Open Tracing System for P2P File Sharing Systems An Open Tracing System for P2P File Sharing Systems Danny Hughes, James Walkerdine Computing Department Lancaster University Lancaster, UK danny@comp.lancs.ac.uk walkerdi@comp.lancs.ac.uk Kevin Lee School

More information

A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network

A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network Bianca Enache Communication Department Politehnica University of Timisoara Timisoara, Romania enache.biancaemilia@gmail.com

More information

DDoS Vulnerability Analysis of Bittorrent Protocol

DDoS Vulnerability Analysis of Bittorrent Protocol DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia kcsia@cs.ucla.edu Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number

More information

Peer to peer networking: Main aspects and conclusions from the view of Internet service providers

Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Gerhard Haßlinger, Department of Computer Science, Darmstadt University of Technology, Germany Abstract:

More information

Network Intrusion Simulation Using OPNET

Network Intrusion Simulation Using OPNET Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,

More information

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network White paper Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network July 2001 Executive Summary Rich media content like audio and video streaming over the Internet is becoming

More information

A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing

A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing Liang-Teh Lee, Kang-Yuan Liu, Hui-Yang Huang and Chia-Ying Tseng Department of Computer Science and Engineering,

More information

Stream Processing on GPUs Using Distributed Multimedia Middleware

Stream Processing on GPUs Using Distributed Multimedia Middleware Stream Processing on GPUs Using Distributed Multimedia Middleware Michael Repplinger 1,2, and Philipp Slusallek 1,2 1 Computer Graphics Lab, Saarland University, Saarbrücken, Germany 2 German Research

More information

A Framework of User-Driven Data Analytics in the Cloud for Course Management

A Framework of User-Driven Data Analytics in the Cloud for Course Management A Framework of User-Driven Data Analytics in the Cloud for Course Management Jie ZHANG 1, William Chandra TJHI 2, Bu Sung LEE 1, Kee Khoon LEE 2, Julita VASSILEVA 3 & Chee Kit LOOI 4 1 School of Computer

More information

LCMON Network Traffic Analysis

LCMON Network Traffic Analysis LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia adamblack@swin.edu.au Abstract The Swinburne

More information

Research on Operation Management under the Environment of Cloud Computing Data Center

Research on Operation Management under the Environment of Cloud Computing Data Center , pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering

More information

P2P: centralized directory (Napster s Approach)

P2P: centralized directory (Napster s Approach) P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application

More information

HMC: A Novel Mechanism for Identifying Encrypted P2P Thunder Traffic

HMC: A Novel Mechanism for Identifying Encrypted P2P Thunder Traffic HMC: A Novel Mechanism for Identifying Encrypted P2P Thunder Traffic Chenglong Li* and Yibo Xue Department of Computer Science & Techlogy, Research Institute of Information Techlogy (RIIT), Tsinghua University,

More information

Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform

Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Shie-Yuan Wang Department of Computer Science National Chiao Tung University, Taiwan Email: shieyuan@cs.nctu.edu.tw

More information

Identifying Peer-to-Peer Traffic Based on Traffic Characteristics

Identifying Peer-to-Peer Traffic Based on Traffic Characteristics Identifying Peer-to-Peer Traffic Based on Traffic Characteristics Prof S. R. Patil Dept. of Computer Engineering SIT, Savitribai Phule Pune University Lonavala, India srp.sit@sinhgad.edu Suraj Sanjay Dangat

More information

A Comparison of Mobile Peer-to-peer File-sharing Clients

A Comparison of Mobile Peer-to-peer File-sharing Clients 1. ABSTRACT A Comparison of Mobile Peer-to-peer File-sharing Clients Imre Kelényi 1, Péter Ekler 1, Bertalan Forstner 2 PHD Students 1, Assistant Professor 2 Budapest University of Technology and Economics

More information

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by

More information

Self-Compressive Approach for Distributed System Monitoring

Self-Compressive Approach for Distributed System Monitoring Self-Compressive Approach for Distributed System Monitoring Akshada T Bhondave Dr D.Y Patil COE Computer Department, Pune University, India Santoshkumar Biradar Assistant Prof. Dr D.Y Patil COE, Computer

More information

DDoS Attacks by Subverting Membership Management in P2P Systems

DDoS Attacks by Subverting Membership Management in P2P Systems DDoS Attacks by Subverting Membership Management in P2P Systems Xin Sun, Ruben Torres and Sanjay Rao Purdue University {sun19,rtorresg,sanjay}@ecn.purdue.edu Abstract We show that malicious participants

More information

Application Delivery Testing at 100Gbps and Beyond

Application Delivery Testing at 100Gbps and Beyond Application Delivery Testing at 100Gbps and Beyond The Need for Speed 10 Gigabit Ethernet (GE) rapidly became the technology of choice for high speed connections to servers and network devices. Advancements

More information

Research of Postal Data mining system based on big data

Research of Postal Data mining system based on big data 3rd International Conference on Mechatronics, Robotics and Automation (ICMRA 2015) Research of Postal Data mining system based on big data Xia Hu 1, Yanfeng Jin 1, Fan Wang 1 1 Shi Jiazhuang Post & Telecommunication

More information

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška

More information

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Peer-to-Peer

More information

Load Distribution in Large Scale Network Monitoring Infrastructures

Load Distribution in Large Scale Network Monitoring Infrastructures Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

MetroNet6 - Homeland Security IPv6 R&D over Wireless

MetroNet6 - Homeland Security IPv6 R&D over Wireless MetroNet6 - Homeland Security IPv6 R&D over Wireless By: George Usi, President, Sacramento Technology Group and Project Manager, California IPv6 Task Force gusi@sactechgroup.com Acknowledgement Reference:

More information

Random forest algorithm in big data environment

Random forest algorithm in big data environment Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest

More information

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia kirill.krinkin@fruct.org Eugene Kalishenko Saint Petersburg

More information

Automatic Configuration and Service Discovery for Networked Smart Devices

Automatic Configuration and Service Discovery for Networked Smart Devices Automatic Configuration and Service Discovery for Networked Smart Devices Günter Obiltschnig Applied Informatics Software Engineering GmbH St. Peter 33 9184 St. Jakob im Rosental Austria Tel: +43 4253

More information

A Proposed Framework for Ranking and Reservation of Cloud Services Based on Quality of Service

A Proposed Framework for Ranking and Reservation of Cloud Services Based on Quality of Service II,III A Proposed Framework for Ranking and Reservation of Cloud Services Based on Quality of Service I Samir.m.zaid, II Hazem.m.elbakry, III Islam.m.abdelhady I Dept. of Geology, Faculty of Sciences,

More information

How To Monitor Performance On Eve

How To Monitor Performance On Eve Performance Monitoring on Networked Virtual Environments C. Bouras 1, 2, E. Giannaka 1, 2 Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet applications,

More information

Availability and Load Balancing in Cloud Computing

Availability and Load Balancing in Cloud Computing 2011 International Conference on Computer and Software Modeling IPCSIT vol.14 (2011) (2011) IACSIT Press, Singapore Availability and Load Balancing in Cloud Computing Zenon Chaczko 1, Venkatesh Mahadevan

More information

LIVE VIDEO STREAMING USING ANDROID

LIVE VIDEO STREAMING USING ANDROID LIVE VIDEO STREAMING USING ANDROID Dharini Chhajed 1, Shivani Rajput 2 and Sneha Kumari 3 1,2,3 Department of Electronics Engineering, Padmashree Dr. D. Y. Patil Institute of Engineering and Technology,

More information

Gaining Operational Efficiencies with the Enterasys S-Series

Gaining Operational Efficiencies with the Enterasys S-Series Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction

More information

diversifeye Application Note

diversifeye Application Note diversifeye Application Note Test Performance of IGMP based Multicast Services with emulated IPTV STBs Shenick Network Systems Test Performance of IGMP based Multicast Services with emulated IPTV STBs

More information

Towards a Peer-to-Peer Extended Content Delivery Network

Towards a Peer-to-Peer Extended Content Delivery Network Towards a Peer-to-Peer Extended Content Delivery Network Daniel Pakkala and Juhani Latvakoski VTT Electronics, Kaitoväylä 1, P.O. Box 1100, FIN-90571 Oulu, Finland E-mail: {Daniel.Pakkala, Juhani.Latvakoski}@vtt.fi

More information

Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching

Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching 2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction

More information

Speed Performance Improvement of Vehicle Blob Tracking System

Speed Performance Improvement of Vehicle Blob Tracking System Speed Performance Improvement of Vehicle Blob Tracking System Sung Chun Lee and Ram Nevatia University of Southern California, Los Angeles, CA 90089, USA sungchun@usc.edu, nevatia@usc.edu Abstract. A speed

More information