III. ARCHITECTURE JOURNAL OF NETWORKS, VOL. 7, NO. 10, OCTOBER Figure 1. Resource monitoring architecture for P2P IPTV systems.
|
|
- John Flowers
- 8 years ago
- Views:
Transcription
1 1624 JOURNAL OF NETWORKS, VOL. 7, NO. 10, OCTOBER 2012 IPTV-RM: A Resources Monitoring Architecture for P2P IPTV Systems Wenxian Wang Network and Trusted Computing Institute, College of Computer Science, Sichuan University, Chengdu, China Institute of Information Security, Sichuan University, Chengdu, China catean@163.com, catean@scu.edu.cn Xingshu Chen and Haizhou Wang Network and Trusted Computing Institute, College of Computer Science, Sichuan University, Chengdu, China chenxsh@scu.edu.cn, whzh.nc@qq.com Abstract Resources monitoring is an important problem of the overall efficient usage and control of P2P IPTV systems. The resources of IPTV can include all distributing servers, programs and peers. Several researches have tried to address this issue, but most of them illuminated P2P traffic characterization, identification and user behavior. The main contributions of this paper are twofold. Firstly, a resources monitoring architecture for P2P IPTV systems, IPTV-RM, was presented based on previous work. The monitoring architecture employs a hierarchical structure and provides systemic monitoring including resources discovery, relative information extraction and analysis, trace and location. It gives a systematic framework for IPTV resources monitoring. Secondly, a distributed program crawling system (DMP-) was first proposed to collect information of programs, and a peer crawling system was put forward to harvest peers of a program. The results show that they are efficient and can be used for resource collection of other P2P system. Index Terms P2P, IPTV, IPTV-RM, Resources Monitoring, I. INTRODUCTION Peer-to-Peer (P2P) applications take advantage of resources such as storage, CPU cycles, content or human presence available at the edge of the Internet in order to provide a service [1]. With the development and maturity of P2P technology, P2P applications become more and more popular in recent ten years, which include filesharing systems, audio-based VOIP systems, and videobased IPTV systems [2-5]. However, they account for a significant proportion of Internet traffic. According to a survey from CacheLogic [6] in June, 2004, 60% of the Internet s traffic is P2P. In Addition, P2P IPTV applications, such as PPLive [2], QQLive [4] in China, Foundation item: Project (2007CB311106) supported by Major State Basic Research Development Program of China; Project ((242)2009A82) supported by Special Plan Program of National Information Security. Corresponding author: Xingshu Chen, Professor of Sichuan University; Tel: ; chenxsh@scu.edu.cn. become popular gradually and contribute a great amount of P2P traffic to Internet [7]. And it was reported that PPLive has more than 200 million user installations and its active monthly user base (as of Dec 2010) is 104 million, i.e., PPLive has a 43% penetration of Chinese internet users [8]. Now P2P IPTV systems are difficult to be monitored because they use proprietary protocols and there are scarcely source codes or official documents published. Monitoring P2P IPTV systems is a critical problem, and several researches have tried to address this issue. But most researches illuminated P2P traffic characterization, identification, system performance and user behavior. This paper proposed IPTV-RM, a resource monitoring architecture for P2P IPTV systems. And the prototype system was developed to monitor popular P2P IPTV systems, such as PPLive, PPStream, UUSee and SopCast. The remainder of this paper is structured as follows: Section II presents relate work of P2P systems monitoring. Section III describes IPTV-RM, a resources monitoring architecture for P2P IPTV systems. Section IV provides implementation of program and peer crawling system. Section V presents monitoring results of program and peer crawling system. Finally, section VI concludes the paper and gives the future work. II. RELATED WORK There have been many studies about P2P systems monitoring. The monitoring approaches they use can be classified in two discrete tracing methods: passive tracing and active tracing. The passive approach is performed by deploying code at suitable points in the network infrastructure. The P2P traffic is identified from general Internet traffic with the known behavior (e.g. connection ports, feature or patterns) of P2P systems. The passive approach does not increase the traffic on the network. Sen et al. developed a signature-based payload methodology to identify P2P traffic [9]. Karagiannis and Broido proposed an identification method based on statistical characterization of P2P traffic flows [10]. Sebastian first introduced a machine learning method to P2P traffic recognition, and doi: /jnw
2 JOURNAL OF NETWORKS, VOL. 7, NO. 10, OCTOBER used the unsupervised Bayesian learning algorithm for traffic classification [11]. After that, several P2P traffic identification algorithms based on machine learning were proposed [12], such as semi-supervised clustering algorithm, decision tree algorithm, neural network algorithm and support vector machine. The passive approach is potentially transparent, scalable and allows comparison of traffic from multiple domains side-by-side. However, it is dependent upon access to core network infrastructure, which is not always feasible. So it is often used for flow control in firewall or gateway devices. The active approach relies on special crawler to inject test packets into P2P network or send packets to servers and peers, following them and measuring characters of P2P network. Saroiu et al. performed the first active tracing of the Gnutella and Napster Network [13]. They sought to precisely characterize the population of enduser hosts that participate in these two systems. Ripneau et al. developed a crawler that joined the Gnutella network as a servant and used the membership protocol (the PING-PONG mechanism) to collect topology information [14]. From then on, many studies based active method were performed on P2P file sharing system such as BitTorrent, Kazaa and emule. P2P IPTV technology has been restricted by low broadband penetration in the past; however, the rapid and large-scale popularization of broadband technology makes it possible to become the next disruptive IP communication technology, which will greatly revolutionize the people s lives and entertainment [15]. There have been several IPTV applications raised and gained great success commercially, including CoolStreaming [16], PPTV [2], PPStream [3], SopCast [17] and so on. And these IPTV systems draw people s attention, including research fellow. Hei et al. carried out the first active tracing of a commercial P2P IPTV system, namely, PPLive [18]. They further developed a dedicated PPLive crawler to study the global characteristics of PPLive system [19]. Wu et al. presented Magellan to characterize topologies of peer-to-peer streaming networks of UUSee [20]. Vu et al. mapped the PPLive Network to study the impacts of media streaming on P2P overlays [21, 28, 29]. Most of the previous work was performed from a single view of observation or from few nodes within direct access and lacked an automatic system for executing measurements and monitoring. These studies tended to mainly look at either network-centric metrics (e.g., traffic characterization, TCP or UDP connections, video traffic), or user-centric metrics (e.g., user arrival and departure, geographic distribution, channel population). Our studies focused primarily on systemic architecture for resources monitoring, including resources discovery, relative information extraction and analysis, trace and location. And a distributed program crawling system (DMP-) was first proposed to collect various information of programs. III. ARCHITECTURE As shown in Fig. 1, IPTV-RM, the architecture for P2P IPTV system resources monitoring, includes four main components: Task Scheduling Center which allocating various tasks to servers, Information Collector which collects information of relative websites, distributing servers and programs from network, Data Processor which filters and analyzes information obtained by collector, and Monitor Dashboard which performs system management, query, report and monitoring. Figure 1. Resource monitoring architecture for P2P IPTV systems. A. Task Scheduling Center Task Scheduling Center allocates various tasks to servers. As the task scheduling and load balancing is a NP complete problem in a distributed computing environment, fuzzy control theory is introduced to the distributed task scheduling. We proposed a new fuzzy scheduling algorithm based on the fuzzy control theory and task request quality of service [22]. While allocating tasks by the algorithm, the center can choose the best server node to execute every task, maximize the processing capacity of each node, and keep the load of each node in relative balance, especially in the case of large number of tasks. B. Information Collector Information Collector collects information of IPTV websites, distributing servers and programs from Internet and IPTV overlay network. It contains three modules: Websites Discovery, Severs Discovery and. Websites Discovery module is based on a focused crawler [23] which is designed to search relative IPTV systems websites and to collect various information, such as homepage, IP address and ICP license. Through statistic analysis of captured raw packets of communication between peers and servers, Servers Discovery module can grab information of distributing servers like program-list servers, media distributing servers and peer list servers module includes two kinds of special crawlers, namely, program crawler and peer crawler. A program crawler is a disguised IPTV client. It requests program information (e.g. Name, bitrate, description, play-link) from program-list servers. While a peer crawler is used to collect participating peers in the same program.
3 1626 JOURNAL OF NETWORKS, VOL. 7, NO. 10, OCTOBER 2012 C. Data Processor Data Processor includes four modules: Data Filtering, Data Repository, Data Analysis and Storage. All the data obtained by Information Collector are filtered and stored in Data Repository. Data Filter module is mainly used for programs classification and sensitive programs marking through text-based analysis technologies. Data Analysis module is used for statistics and features analysis, which can be used to predict propagation speed and trend of popular programs. The purpose of Storage module is to store records of specified programs. With Data Processor, the monitoring system is able to automatically associate data with a given reference point (time, location, ICP, etc.) and to categorize the programs that are popular. The continuous trace of a program can also be built up to determine how a program is being distributed across various IPTV network by peer crawler. D. Monitor Dashboard Monitor Dashboard includes four modules: System Management, Resource Location, Query and Report, and Monitoring. System Management module is in charge of administration of monitoring system, and includes fault management, configuration management, performance management and security management. Through configuration management, the administrator can easily start or terminate various crawlers at regular time. Resource Location module is based on IP-to-location database like MaxMind [24]. This module can display location of distributing server or peers in a worldwide map. Query and Report module provides easy interface for query and generates statistic reports (e.g. statistical figures, spreadsheets). Monitoring modules is used for trace, record and pollution attack of popular or sensitive programs. Peer crawler mentioned previously can perform trace of a program. A program can be recorded, converted and saved as a video file by FFmpeg [25]. Pollution attack of a program is conducted by a dedicated crawler developed by us [15]. The results show that a single polluter is capable of compromising the whole system and its destructiveness is severe. IV. IMPLEMENTATION Fig. 2 briefly outlines the basic processes of data. First, a focused crawler [23] is designed to collect information of the IPTV systems websites. In addition, program crawler and peer crawler, based on principle of IPTV protocols through passive trace and reverse engineering technology, are developed to obtain information of distributing servers, peers and programs. Then the information is filtered and stored in data repository and is further analyzed and classified. According the command of monitor dashboard, trace of some program is carried out by a few peer crawlers, which can collect viewing peers information (e.g., IP address, TCP number) in a period of time. Figure 2. Processes of data. A. Program Crawling Program-list distribution is very important in IPTV systems. When a client starts up, it requests program-list file from program-list servers and updates the information of programs immediately. The list of program includes program name, program play-link which is the most important identification of signal communication among peers, program descriptions and so on. The client-server architecture is usually adopted to distribute program-list file in IPTV systems, as shown in Fig. 3. The program-list file uses XML to organize various properties of programs. With the number of programs increasing rapidly, the size of program-list file becomes bigger and bigger. For example, PPLive had about 300 thousand programs in 2010, and the size of program-list file was more than 20MB. That is a heavy burden to servers, and makes bad experience to users. Some IPTV systems use compression to decrease the file size, and others use multiple programlist files. Figure 3. Program-list distribution architecture of IPTV. An efficient Distributed Multi-Protocol System (DMP-) was proposed to obtain various information of programs in popular IPTV systems. We used {program name, IPTV protocol} to uniquely identify a program. Fig. 4 presents an overview of the program crawler system architecture. On the basis of crawler clients status, the crawler controller assigns tasks to multiple independent crawler clients. Each crawler client periodically reports its crawling status, CPU and memory consumption to crawler controller.
4 JOURNAL OF NETWORKS, VOL. 7, NO. 10, OCTOBER CPUs and 1GB Memory at Sichuan University of China with 10/100Mbps Ethernet network access. The detailed distributed peer crawler system architecture is plotted in Fig. 6. Controller Database Host Host Host... Process Process Process Crawling Thread Crawling Thread Crawling Thread P2P IPTV Network Figure 4. Distributed multi-protocol crawler system. According to crawling task type, the crawler client invokes Engine, requests program-list file from program-list servers and reports crawling status to crawler controller. When program-list file is downloaded, the crawler client extracts metadata of programs from the file, classifies these programs and stores all information in database. B. Peer Crawling Fig. 5 illustrates the procedures that a peer crawler joins the IPTV network to harvest peers [50]. Figure 5. Workflow of peer crawler. (1) the peer crawler requests the latest program file from program-list servers and updates it immediately; (2) after the peer crawler selects one program to watch, it registers itself in the peer-list servers (tracker servers) and sends out multiple query messages, generally five, to the servers to retrieve a small set of peers that are watching the same program; (3) upon receiving the initial list of peers, the peer crawler uses this seed peer list to harvest additional lists by periodically probing active peers which maintain a list of peers. From the knowledge of the measurement studies for P2P file sharing system presented in [26], the accuracy of captured overlay snapshots depends on the crawling speed because of the high dynamic nature of P2P overlay network. Therefore, we developed a fast and efficient distributed peer crawler system (Peer-), which can capture significantly more accurate snapshots of the IPTV overlay network than previous crawlers [19, 27]. In our experiment, the distributed crawler system was deployed on six PCs with two 2.60GHz Pentium (R) Peer Peer Figure 6. Distributed peer crawler system. controller: The crawler controller accepts play-link of a program as input argument of crawling startup, and then constructs query messages for retrieving peer-list from peer-list servers or partner peers. At the beginning of crawling, the crawler controller implement step 2 of Fig. 5 to retrieve the initial set of peers and then coordinates among multiple independent crawler hosts. In more detail, the crawler controller assigns part of the initial peers to each crawler host and waits for the crawling results from them by using asynchronous communications. Each crawler host then probes these seed peers to harvest additional peer lists and reports crawling results to crawler controller. The distributed crawler system uses adaptive scheduling algorithm to ensure each crawler host remain busy, which is of crucial importance for making full use of the heterogeneous processing capabilities of various crawler hosts. host: After receiving seed peers from crawler controller, each crawler host implements step 3 of Fig. 5 to harvest peer-list in parallel. Upon accomplishing the mission for tracing seed peers, the crawler host then reports crawling results to crawler controller and wait for new missions. hosts are independent crawlers to explore different parts of single program overlay network. Additionally, to achieve a high degree of concurrency, each crawler process creates multiple crawling threads that can independently harvest peer lists from ITV overlay network. C. Peer Crawling Performance Owing to the mismatch between the arrival and departure lags [19], the peer number of crawling results may overestimate the real active peers. Moreover, it is a challenge for Peer- to probe all the peers due to network congestion and NAT problem, which may not respond to peer-list requests at all. According to the resource distribution mechanism of IPTV system, we can harvest almost all the peers information from peer-list servers and partner peers depending on appropriate measurement intervals. To present Peer- performance in speed and efficiency of capturing IPTV
5 1628 JOURNAL OF NETWORKS, VOL. 7, NO. 10, OCTOBER 2012 overlay snapshots, several notations were used to evaluate the completeness of crawling results and efficiency of Peer-. The notations are listed in Table I. TABLE I. THE NOTIONS Symbol Explanation for Symbols Δ t the interval of sending peer-list request T the overall time of crawling program N the actual peer number of program overlay network N the peer number of program overlay network which harvested by crawlers μ t the number of peers which harvested by crawlers at time t ρ the completeness of crawling results ψ the efficiency of crawler system From the above crawling workflow proposed by us, we can know that: μt+δ t μt lim = 0. (1) t T Δt The completeness of crawling results ρ is defined as follow: ρ = N N. (2) It is impossible for Peer- to obtain the precise number of peers in program overlay network, because just only the IPTV providers can know this information by their own platform. However, we can obtain this approximate number by setting appropriate measurement intervals in our experiment. With the method of curve fitting, we discovered a certain quadratic functional relationship between Δ t and T as follow: T 2 = α( Δt) + β Δt γ. (3) + Consequently, we defined the efficiency of Peer- as follow: ρ N N ψ = = =. (4) 2 T N T N ( α( Δt) + β Δt + γ ) That is, the efficiency of Peer- will increase with the reduction of Δ t. Therefore, we implemented a comparative experiment by setting Δ t as 0ms, 1ms, 2ms, 3ms, 5ms and 10ms respectively to choose a suitable parameter. We presented how the number of the participating users evolves for a very popular program with the different intervals of sending peer-list request, as shown in Fig. 7. From the experiment results shown in Fig. 7, we can observe that: (1) If Δ t =0ms, the process of crawling stops within 10 seconds, however, the crawler can only harvest about 2000 peers which has a large deviation compared with the real value. (2) As the value of Δ t increases, the overall crawling time is also growing. (3) When Δ t =1ms or Δ t =2ms, the crawling time of two situations are both about 38 seconds, but the later reaches faster convergence rate than the former. (4) As for Δ t =10ms, the process of crawling lasts about 94 seconds, which is too long time to capture accurate overlay snapshots. Consequently, we concluded that Δ t =2ms is the most valuable interval of sending peer-list request to archive more accurate and complete crawling results with relatively shorter period. Figure 7. Program-list distribution architecture of IPTV V. RESULTS A. Program Crawling The program crawling system was developed in December 2008 and was made of one Controller and ten Clients. The system was deployed on three PC Servers with Intel E5506 CPU and 4GB Memory at Beijing of China with 10Mbps Ethernet network access. From February 2009 to December 2010, the program crawling system collected resources from 28 IPTV systems in China, and obtained 7, 679, 331 program information, in which the proportion of videos on demand is 99.6%. In particular, PPfilm has no live program. Fig. 8 shows program s percent of IPTV systems. PPTV has 25.6 percent programs, while PPfilm has 20.8 percent programs. Figure 8. Program s percent of IPTV systems. We ranked each of the IPTV systems according to their number of program and plotted a typical Cumulative Distribution Function (CDF) of program s percent in Fig. 9. The 21.4% (6/28) popular IPTV systems count for about 80% programs. The 32.1% (9/28) popular IPTV systems have more than 90% programs. Some IPTV systems, like SopCast and TVUPlayer, have only a small proportion of programs, for they have no videos on demand.
6 JOURNAL OF NETWORKS, VOL. 7, NO. 10, OCTOBER Figure 9. CDF of program s percent. B. Peer Crawling A popular channel named My Own Swordsmen was chosen for the experiment because this program has a clear diurnal trend of the evolution of peers viewing program. Fig. 10 shows the peer participation evolution. In Fig. 10, the curves of the number of peers are very similar during the seven measurement days. The daily peers remain with a constant diurnal viewing pattern. The major peaks appear at 1PM and 10PM in one day. This might suggest that P2P IPTV users have different viewing habits from TV audiences. Figure 10. Evolution of the number of simultaneous users (March 10 to March 16, 2008). Fig. 11 and Fig 12 present how the number of participating users evolves for a popular and an unpopular program. Note that the number of participating users of popular program differs greatly from that of unpopular program. The maximum and mean numbers of users of the popular program are 3224 and 1675 respectively; however, those of the unpopular program are only 268 and 100. Figure 11. Diurnal trend of number of participating users of popular program ( My Own Swordsmen, March 10, 2008). Figure 12. Diurnal trend of number of participating users of unpopular program ( Sex and the City, March 10, 2008). VI. CONCLUSION AND FUTURE WORK With the popularity of P2P IPTV systems, it is necessary to monitor information in their overlay for security issue. Based on previous work [48-50, 54], we outline IPTV-RM, a resources monitoring architecture for P2P IPTV System, primarily addressing hierarchical structure and collector. It gives a systematic frame work for IPTV resources monitoring. In addition, Distributed Multi-Protocol System and Peer- system are proposed. To date an IPTV monitoring prototype system has been developed. This monitoring system carries out its monitoring activity using active monitoring. The monitoring system have collected more than 7 million programs. We can trace a program by Peer- system. In the next work, we focus on other monitoring methods and analysis of programs. ACKNOWLEDGMENT This work was supported by Major State Basic Research Development Program of China ( 973 Program) (Number 2007CB311106) and Special Plan Program of National Information Security (Number (242)2009A82). The research presented in this paper would not have been possible without our institutes, at Sichuan University, Chengdu. We wish to thank the reviewers for their valuable suggestions. REFERENCES [1] D. Hughes, J. Walkerdine and K. Lee, Monitoring Challenges and Approaches for P2P File-Sharing Systems, in First International Conference on Internet Surveillance and Protection (ICISP 06), Cap Esterel, Cote d Azur, France. USA: IEEE Press, [2] The PPTV (former PPLive) Homepage. [ ]. http: // [3] The PPStream Homepage. [ ]. http: // [4] The Tencent video (former QQLive) Homepage [EB/OL]. [ ]. http: //v.qq.com/. [5] The UUSee Homepage. [ ]. http: // [6] True Picture of P2P Filesharing. [ ]. [Online]. Available: http: // [7] R. Wang, Y. Liu, Y. Yang et al., Solving the App-Level Classification Problem of P2P Traffic Via Optimized
7 1630 JOURNAL OF NETWORKS, VOL. 7, NO. 10, OCTOBER 2012 Support Vector Machines, in Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA'06), 2006, Vol. 2, pp [8] The Synacast Homepage. [ ]. http: // [9] S. Sen, O. Spatscheck and D. M. Wang, Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures, in Proceedings of the 13th international conference on World Wide Web (WWW2004), New York, USA, [Online]. Available: http: //www2004.org/proceedings/docs/1p512.pdf. [10] T. Karagiannis and A. Broido, Transport Layer Identification of P2P Traffic, in Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, Sicily, Italy. USA: ACM, 2004, pp [11] S. Zander and T. Nguyen, Automated traffic classification and application identification using machine learning, in Proceedings of the IEEE Conference on Local Computer Networks 30th Anniversary. Sydney, NSW. USA: IEEE Press, 2005, pp [12] H. Liu, W. Feng, Y.g Huang, et al., A Peer-To-Peer Traffic Identification Method Using Machine Learning, in International Conference on Networking, Architecture, and Storage (NAS 2007), IEEE Press, July 2007, pp [13] S. Saroiu, P. Gummadi, and S. D. Gribble, A Measurement Study of Peer-to-Peer File Sharing Systems, in Tech. Report UW-CSE , Dept. of Computer Science and Eng., UniV. of Washington, Seattle, July [14] M. Ripeani, A. Iamnitchi, and I. Foster, Mapping the Gnutella Network, IEEE Internet Computing, vol. 6, no. 1, pp , [15] H. Wang, X. Chen, W. Wang, A Measurement Study of Polluting a Large-Scale P2P IPTV System, China Communications, Vol. 8, No. 2, pp , [16] X. Zhang, J. Liu, B. Li et al., DONet/CoolStreaming: A Data-driven Overlay Network for Peer-to-Peer Live Media Streaming, in Proceedings of 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Miami, FL. USA: IEEE Press, 2005, pp [17] The SopCast Homepage. [ ]. http: // [18] X. Hei, C. Liang, J. Liang, Y. Liu, and K. W. Ross, Insight into PPLive: Measurement Study of a Large Scale P2P IPTV System, in IPTV workshop in conjunction with WWW2006, May [Online]. Available: http: //cis.poly.edu/ross/papers/ppliveworkshop.pdf. [19] X. Hei, C. Liang, J. Liang, Y. Liu, and K. W. Ross, A Measurement Study of a Large-scale P2P IPTV System, IEEE Transactions on Multimedia, Vol. 9, No. 8, pp , [20] C. Wu, B Li, and S. Zhao, Exploring Large-scale Peer-to- Peer Live Streaming Topologies, ACM Transactions on Multimedia Computer Communication Applications, Vol. 4, No. 3, pp. 1-23, [21] L. Vu, I. Gupta, J. Liang, and K. Nahrstedt, Measurement of a Large-scale Overlay for Multimedia Streaming, in Proceedings of the 16th International Symposium on High Performance Distributed Computing (HPDC 07), Monterey Bay, CA, USA. USA: IEEE Press, June 2007, pp [Online]. Available: http: //cairo.cs.uiuc.edu/publications/papers/hpdc-poster.pdf. [22] Y. Duan, X. Chen, and W. Wang, The Research of distributed task scheduling algorithm based on Fuzzy Control, in Proceedings of International Conference on Information Security and Artificial Intelligence (ISAI 2010), Chengdu, China. USA: IEEE Press, 2010, pp [23] W. Wang, X. Chen, and H. Wang, A focused crawler based on naive Bayes classifier, in Proceedings of the Third International symposium on Intelligent Information Technology and Security Informatics (IITSI 2010), Jinggangshan, China. USA: IEEE Press, 2010, pp [24] The MaxMind Free Geolocation Database Homepage. [ ] http: // [25] The FFmpeg Homepage. [ ]. http: //ffmpeg.org/. [26] D. Stutzbach and R. Rejaie, Capturing Accurate Snapshots of the Gnutella Network, in 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2005), Miami, FL, USA. USA: IEEE Press, 2005, pp [27] L. Vu, I. Gupta, K. Nahrstedt, et al., Understanding overlay characteristics of a large-scale peer-to-peer IPTV system, ACM Transactions on Multimedia Computing, Communications and Applications, Vol. 6, No. 4, pp , [28] R. Zhu, J. Wang, Power-Efficient Spatial Reusable Channel Assignment Scheme in WLAN Mesh Networks, Mobile Networks and Applications, vol. 17, no. 1. pp , [29] R. Zhu, Intelligent Rate Control for Supporting Real-time Traffic in WLAN Mesh Networks, Journal of Network and Computer Applications, vol. 34, no. 5, pp , Wenxian Wang was born in Jinjiang of Fujian province of China in He received his M.E. degrees from College of Chemical Engineering, Sichuan University, China, in He is a lecturer of Network and Trusted Computing Institute, and is currently a Ph.D. candidate at the Institute of Information Security, Sichuan University. He is a member of the International Association of Computer Science and Information Technology (IACSIT). He took part in project Key Technology of P2P Applications Monitoring System, awarded Scientific and Technological Progress Second-class Award of Sichuan Province of China in September His research interests include peer-to-peer networks, information security and trusted computing. Xingshu Chen was born in She received her M.S. degree from College of Computer Science of Sichuan University, Chengdu, China, in 2000 and Ph.D. degree from Institute of Information Security at Sichuan University, Chengdu, China, in From 2005 to 2010, she was with College of Computer Science as an assistant professor, working with teaching and research. Currently, she is a professor and Ph.D. supervisor of College of Computer Science. She is currently the director of Network and Trusted Computing Institute (NTCI) and vice director of Information Management Center. She awarded Scientific and Technological Progress Second-class Award of Sichuan Province of China in September Her general research interests include peer-to-peer networks, information security, computer networks and cloud computing. Haizhou Wang was born in He received his B.E. degrees from College of Computer Science, Sichuan University, China, in He is currently working toward the Ph.D. degree at the same University. He awarded Outstanding Graduate Student of Sichuan University twice in 2009 and 2010, and 3rd Prize in 2010 NVIDIA CUDA Collegiate Programming Contest of China. His research interests include peer-to-peer IPTV systems, information security, and network measurement.
Using UDP Packets to Detect P2P File Sharing
188 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 27 Using UDP Packets to Detect P2P File Sharing Tsang-Long Pao and Jian-Bo Chen Tatung University, Taipei,
More informationA Measurement of NAT & Firewall Characteristics in Peer to Peer Systems
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands l.dacunto@tudelft.nl
More informationpacket retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
More information1672 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 9, NO. 8, DECEMBER 2007
1672 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 9, NO. 8, DECEMBER 2007 A Measurement Study of a Large-Scale P2P IPTV System Xiaojun Hei, Student Member, IEEE, Chao Liang, Student Member, IEEE, Jian Liang,
More informationOn the Penetration of Business Networks by P2P File Sharing
On the Penetration of Business Networks by P2P File Sharing Kevin Lee School of Computer Science, University of Manchester, Manchester, M13 9PL, UK. +44 (0) 161 2756132 klee@cs.man.ac.uk Danny Hughes Computing,
More informationA Measurement Study of Peer-to-Peer File Sharing Systems
CSF641 P2P Computing 點 對 點 計 算 A Measurement Study of Peer-to-Peer File Sharing Systems Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble Department of Computer Science and Engineering University
More informationTrace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic
Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic William Acosta and Surendar Chandra University of Notre Dame, Notre Dame IN, 46556, USA {wacosta,surendar}@cse.nd.edu Abstract.
More informationA Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You erkyou@indiana.edu ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
More informationA. Related Measurement Work on Mesh-pull Streaming Systems
Inferring Network-Wide Quality in P2P Live Streaming Systems Xiaojun Hei, Yong Liu and Keith W. Ross Department of Computer and Information Science Department of Electrical and Computer Engineering Polytechnic
More informationOn the Penetration of Business Networks by P2P File Sharing
On the Penetration of Business Networks by P2P File Sharing Kevin Lee School of Computer Science, University of Manchester, Manchester, UK. +44 () 161 2756132 klee@cs.man.ac.uk Danny Hughes Computing,
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
More informationAn Efficient Hybrid P2P MMOG Cloud Architecture for Dynamic Load Management. Ginhung Wang, Kuochen Wang
1 An Efficient Hybrid MMOG Cloud Architecture for Dynamic Load Management Ginhung Wang, Kuochen Wang Abstract- In recent years, massively multiplayer online games (MMOGs) become more and more popular.
More informationEncrypted Internet Traffic Classification Method based on Host Behavior
Encrypted Internet Traffic Classification Method based on Host Behavior 1,* Chengjie GU, 1 Shunyi ZHANG, 2 Xiaozhen XUE 1 Institute of Information Network Technology, Nanjing University of Posts and Telecommunications,
More informationCLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES
CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES 1 MYOUNGJIN KIM, 2 CUI YUN, 3 SEUNGHO HAN, 4 HANKU LEE 1,2,3,4 Department of Internet & Multimedia Engineering,
More informationPeer-to-Peer: an Enabling Technology for Next-Generation E-learning
Peer-to-Peer: an Enabling Technology for Next-Generation E-learning Aleksander Bu lkowski 1, Edward Nawarecki 1, and Andrzej Duda 2 1 AGH University of Science and Technology, Dept. Of Computer Science,
More informationCLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab
More informationMODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT Soumya V L 1 and Anirban Basu 2 1 Dept of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, India
More informationA Network Monitoring System with a Peer-to-Peer Architecture
A Network Monitoring System with a Peer-to-Peer Architecture Paulo Salvador, Rui Valadas University of Aveiro / Institute of Telecommunications Aveiro E-mail: salvador@av.it.pt; rv@det.ua.pt Abstract The
More informationThe Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May
More informationA Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster
, pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing
More informationMulticast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
More informationThe Big Data methodology in computer vision systems
The Big Data methodology in computer vision systems Popov S.B. Samara State Aerospace University, Image Processing Systems Institute, Russian Academy of Sciences Abstract. I consider the advantages of
More informationHow To Classify Network Traffic In Real Time
22 Approaching Real-time Network Traffic Classification ISSN 1470-5559 Wei Li, Kaysar Abdin, Robert Dann and Andrew Moore RR-06-12 October 2006 Department of Computer Science Approaching Real-time Network
More informationNew Cloud Computing Network Architecture Directed At Multimedia
2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.16 New Cloud Computing Network
More informationFrom Centralization to Distribution: A Comparison of File Sharing Protocols
From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015
More informationClustering in Peer-to-Peer File Sharing Workloads
Clustering in Peer-to-Peer File Sharing Workloads F. Le Fessant, S. Handurukande, A.-M. Kermarrec & L. Massoulié INRIA-Futurs and LIX, Palaiseau, France Distributed Programming Laboratory, EPFL, Switzerland
More informationOn the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu
On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu Dilip Kumar Krishnappa, Samamon Khemmarat, Lixin Gao, Michael Zink University of Massachusetts Amherst,
More informationA Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
More informationBandwidth Management for Peer-to-Peer Applications
Overview Bandwidth Management for Peer-to-Peer Applications With the increasing proliferation of broadband, more and more users are using Peer-to-Peer (P2P) protocols to share very large files, including
More informationImpact of Peer Incentives on the Dissemination of Polluted Content
Impact of Peer Incentives on the Dissemination of Polluted Content Fabricio Benevenuto fabricio@dcc.ufmg.br Virgilio Almeida virgilio@dcc.ufmg.br Cristiano Costa krusty@dcc.ufmg.br Jussara Almeida jussara@dcc.ufmg.br
More informationComparative Traffic Analysis Study of Popular Applications
Comparative Traffic Analysis Study of Popular Applications Zoltán Móczár and Sándor Molnár High Speed Networks Laboratory Dept. of Telecommunications and Media Informatics Budapest Univ. of Technology
More informationMobile Storage and Search Engine of Information Oriented to Food Cloud
Advance Journal of Food Science and Technology 5(10): 1331-1336, 2013 ISSN: 2042-4868; e-issn: 2042-4876 Maxwell Scientific Organization, 2013 Submitted: May 29, 2013 Accepted: July 04, 2013 Published:
More informationSimulating a File-Sharing P2P Network
Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance
More informationInternet Video Streaming and Cloud-based Multimedia Applications. Outline
Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, yhe@ee.ryerson.ca Ling Guan, lguan@ee.ryerson.ca 1 Outline Internet video streaming Overview Video coding Approaches for video
More informationJournal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392. Research Article. E-commerce recommendation system on cloud computing
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 E-commerce recommendation system on cloud computing
More informationAN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA
AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA Ms. M. Kiruthika Asst. Professor, Fr.C.R.I.T, Vashi, Navi Mumbai. venkatr20032002@gmail.com Ms. Smita Dange Lecturer,
More informationA Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming
A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming Chin Yong Goh 1,Hui Shyong Yeo 1, Hyotaek Lim 1 1 Dongseo University Busan, 617-716, South Korea cgnicky@gmail.com, hui_shyong@hotmail.com,
More informationClassifying P2P Activity in Netflow Records: A Case Study on BitTorrent
IEEE ICC 2013 - Communication Software and Services Symposium 1 Classifying P2P Activity in Netflow Records: A Case Study on BitTorrent Ahmed Bashir 1, Changcheng Huang 1, Biswajit Nandy 2, Nabil Seddigh
More informationLocal-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
More informationOn the impact of the initial peer list in P2P live streaming applications: the case of Sopcast
Universal Journal of Communications and Network 1(4): 142-15, 213 DOI: 1.13189/ujcn.213.143 http://www.hrpub.org On the impact of the initial peer list in P2P live streaming applications: the case of Sopcast
More informationResearch on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
More informationAn Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
More informationA Network Simulation Experiment of WAN Based on OPNET
A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2
More informationClustering in Peer-to-Peer File Sharing Workloads
Clustering in Peer-to-Peer File Sharing Workloads F. Le Fessant, S. Handurukande, A.-M. Kermarrec & L. Massoulié INRIA-Futurs and LIX, Palaiseau, France EPFL, Lausanne, Switzerland Microsoft Research,
More informationAn Architecture Model of Sensor Information System Based on Cloud Computing
An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National
More information5 Applied Machine Learning Theory
5 Applied Machine Learning Theory 5-1 Monitoring and Analysis of Network Traffic in P2P Environment BAN Tao, ANDO Ruo, and KADOBAYASHI Youki Recent statistical studies on telecommunication networks outline
More informationReal Time Network Server Monitoring using Smartphone with Dynamic Load Balancing
www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,
More informationCloud Computing for Agent-based Traffic Management Systems
Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion
More informationAn apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
More informationIntroduction: Why do we need computer networks?
Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February
More informationPerformance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,
More informationMonitoring Challenges and Approaches for P2P File-Sharing Systems
Monitoring Challenges and Approaches for P2P File-Sharing Systems Danny Hughes Computing, InfoLab21, Lancaster University, Lancaster, UK. +44 (0)1524 510351 danny@comp.lancs.ac.uk James Walkerdine Computing,
More informationUnderstanding the Roles of Servers in Large-scale Peer-Assisted Online Storage Systems
Understanding the Roles of Servers in Large-scale Peer-Assisted Online Storage Systems Fangming Liu, Ye Sun, Bo Li, Xinyan Zhang Hong Kong University of Science & Technology, Roxbeam Inc. Abstract Online
More informationReciprocity with Virtual Nodes: Supporting Mobile Nodes in Peer-to- Peer Content Distribution
Reciprocity with Virtual Nodes: Supporting Mobile Nodes in Peer-to- Peer Content Distribution CNSM/SETM Workshop 18.10.2013, Zürich, Switzerland Dipl.-Wirtsch.-Inform. Matthias Wichtlhuber mwichtlh@ps.tu-darmstadt.de
More informationA Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
More informationA Proxy-based Architecture for Multimedia Transmission
Proceedings of the 8th WSEAS International Conference on Automation and Information, Vancouver, Canada, June 19-21, 2007 322 A Proxy-based Architecture for Multimedia Transmission WANG DA-ZHEN [1,2], WAN
More informationATCM: A Novel Agent-based Peer-to-Peer Traffic Control Management
Journal of Computational Information Systems 7: 7 (2011) 2307-2314 Available at http://www.jofcis.com ATCM: A Novel Agent-based Peer-to-Peer Traffic Control Management He XU 1,, Suoping WANG 2, Ruchuan
More informationA Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer
A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer Technology in Streaming Media College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China shuwanneng@yahoo.com.cn
More informationUniversity of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP
University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP This Conference or Workshop Item Adda, Mo, Kasassbeh, M and Peart, Amanda (2005) A survey of network fault management. In: Telecommunications
More informationTransparent Optimization of Grid Server Selection with Real-Time Passive Network Measurements. Marcia Zangrilli and Bruce Lowekamp
Transparent Optimization of Grid Server Selection with Real-Time Passive Network Measurements Marcia Zangrilli and Bruce Lowekamp Overview Grid Services Grid resources modeled as services Define interface
More informationPEER-TO-PEER NETWORK
PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
More informationMethod of Fault Detection in Cloud Computing Systems
, pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,
More informationAn Open Tracing System for P2P File Sharing Systems
An Open Tracing System for P2P File Sharing Systems Danny Hughes, James Walkerdine Computing Department Lancaster University Lancaster, UK danny@comp.lancs.ac.uk walkerdi@comp.lancs.ac.uk Kevin Lee School
More informationA Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network
A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network Bianca Enache Communication Department Politehnica University of Timisoara Timisoara, Romania enache.biancaemilia@gmail.com
More informationDDoS Vulnerability Analysis of Bittorrent Protocol
DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia kcsia@cs.ucla.edu Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number
More informationPeer to peer networking: Main aspects and conclusions from the view of Internet service providers
Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Gerhard Haßlinger, Department of Computer Science, Darmstadt University of Technology, Germany Abstract:
More informationNetwork Intrusion Simulation Using OPNET
Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,
More informationIntelligent Content Delivery Network (CDN) The New Generation of High-Quality Network
White paper Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network July 2001 Executive Summary Rich media content like audio and video streaming over the Internet is becoming
More informationA Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing
A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing Liang-Teh Lee, Kang-Yuan Liu, Hui-Yang Huang and Chia-Ying Tseng Department of Computer Science and Engineering,
More informationStream Processing on GPUs Using Distributed Multimedia Middleware
Stream Processing on GPUs Using Distributed Multimedia Middleware Michael Repplinger 1,2, and Philipp Slusallek 1,2 1 Computer Graphics Lab, Saarland University, Saarbrücken, Germany 2 German Research
More informationA Framework of User-Driven Data Analytics in the Cloud for Course Management
A Framework of User-Driven Data Analytics in the Cloud for Course Management Jie ZHANG 1, William Chandra TJHI 2, Bu Sung LEE 1, Kee Khoon LEE 2, Julita VASSILEVA 3 & Chee Kit LOOI 4 1 School of Computer
More informationLCMON Network Traffic Analysis
LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia adamblack@swin.edu.au Abstract The Swinburne
More informationResearch on Operation Management under the Environment of Cloud Computing Data Center
, pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering
More informationP2P: centralized directory (Napster s Approach)
P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application
More informationHMC: A Novel Mechanism for Identifying Encrypted P2P Thunder Traffic
HMC: A Novel Mechanism for Identifying Encrypted P2P Thunder Traffic Chenglong Li* and Yibo Xue Department of Computer Science & Techlogy, Research Institute of Information Techlogy (RIIT), Tsinghua University,
More informationBenchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform
Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Shie-Yuan Wang Department of Computer Science National Chiao Tung University, Taiwan Email: shieyuan@cs.nctu.edu.tw
More informationIdentifying Peer-to-Peer Traffic Based on Traffic Characteristics
Identifying Peer-to-Peer Traffic Based on Traffic Characteristics Prof S. R. Patil Dept. of Computer Engineering SIT, Savitribai Phule Pune University Lonavala, India srp.sit@sinhgad.edu Suraj Sanjay Dangat
More informationA Comparison of Mobile Peer-to-peer File-sharing Clients
1. ABSTRACT A Comparison of Mobile Peer-to-peer File-sharing Clients Imre Kelényi 1, Péter Ekler 1, Bertalan Forstner 2 PHD Students 1, Assistant Professor 2 Budapest University of Technology and Economics
More informationINCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
More informationSelf-Compressive Approach for Distributed System Monitoring
Self-Compressive Approach for Distributed System Monitoring Akshada T Bhondave Dr D.Y Patil COE Computer Department, Pune University, India Santoshkumar Biradar Assistant Prof. Dr D.Y Patil COE, Computer
More informationDDoS Attacks by Subverting Membership Management in P2P Systems
DDoS Attacks by Subverting Membership Management in P2P Systems Xin Sun, Ruben Torres and Sanjay Rao Purdue University {sun19,rtorresg,sanjay}@ecn.purdue.edu Abstract We show that malicious participants
More informationApplication Delivery Testing at 100Gbps and Beyond
Application Delivery Testing at 100Gbps and Beyond The Need for Speed 10 Gigabit Ethernet (GE) rapidly became the technology of choice for high speed connections to servers and network devices. Advancements
More informationResearch of Postal Data mining system based on big data
3rd International Conference on Mechatronics, Robotics and Automation (ICMRA 2015) Research of Postal Data mining system based on big data Xia Hu 1, Yanfeng Jin 1, Fan Wang 1 1 Shi Jiazhuang Post & Telecommunication
More informationPeer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol
Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška
More informationKrunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Peer-to-Peer
More informationLoad Distribution in Large Scale Network Monitoring Infrastructures
Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu
More informationImplementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
More informationMetroNet6 - Homeland Security IPv6 R&D over Wireless
MetroNet6 - Homeland Security IPv6 R&D over Wireless By: George Usi, President, Sacramento Technology Group and Project Manager, California IPv6 Task Force gusi@sactechgroup.com Acknowledgement Reference:
More informationRandom forest algorithm in big data environment
Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest
More informationTraffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia kirill.krinkin@fruct.org Eugene Kalishenko Saint Petersburg
More informationAutomatic Configuration and Service Discovery for Networked Smart Devices
Automatic Configuration and Service Discovery for Networked Smart Devices Günter Obiltschnig Applied Informatics Software Engineering GmbH St. Peter 33 9184 St. Jakob im Rosental Austria Tel: +43 4253
More informationA Proposed Framework for Ranking and Reservation of Cloud Services Based on Quality of Service
II,III A Proposed Framework for Ranking and Reservation of Cloud Services Based on Quality of Service I Samir.m.zaid, II Hazem.m.elbakry, III Islam.m.abdelhady I Dept. of Geology, Faculty of Sciences,
More informationHow To Monitor Performance On Eve
Performance Monitoring on Networked Virtual Environments C. Bouras 1, 2, E. Giannaka 1, 2 Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet applications,
More informationAvailability and Load Balancing in Cloud Computing
2011 International Conference on Computer and Software Modeling IPCSIT vol.14 (2011) (2011) IACSIT Press, Singapore Availability and Load Balancing in Cloud Computing Zenon Chaczko 1, Venkatesh Mahadevan
More informationLIVE VIDEO STREAMING USING ANDROID
LIVE VIDEO STREAMING USING ANDROID Dharini Chhajed 1, Shivani Rajput 2 and Sneha Kumari 3 1,2,3 Department of Electronics Engineering, Padmashree Dr. D. Y. Patil Institute of Engineering and Technology,
More informationGaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
More informationdiversifeye Application Note
diversifeye Application Note Test Performance of IGMP based Multicast Services with emulated IPTV STBs Shenick Network Systems Test Performance of IGMP based Multicast Services with emulated IPTV STBs
More informationTowards a Peer-to-Peer Extended Content Delivery Network
Towards a Peer-to-Peer Extended Content Delivery Network Daniel Pakkala and Juhani Latvakoski VTT Electronics, Kaitoväylä 1, P.O. Box 1100, FIN-90571 Oulu, Finland E-mail: {Daniel.Pakkala, Juhani.Latvakoski}@vtt.fi
More informationObject Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching
2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction
More informationSpeed Performance Improvement of Vehicle Blob Tracking System
Speed Performance Improvement of Vehicle Blob Tracking System Sung Chun Lee and Ram Nevatia University of Southern California, Los Angeles, CA 90089, USA sungchun@usc.edu, nevatia@usc.edu Abstract. A speed
More information