ATCM: A Novel Agent-based Peer-to-Peer Traffic Control Management
|
|
|
- Alfred Harris
- 9 years ago
- Views:
Transcription
1 Journal of Computational Information Systems 7: 7 (2011) Available at ATCM: A Novel Agent-based Peer-to-Peer Traffic Control Management He XU 1,, Suoping WANG 2, Ruchuan WANG 1, Min WU 1 1 College of Computer, Nanjing University of Posts and Telecommunications, Nanjing , China 2 College of Automation, Nanjing University of Posts and Telecommunications, Nanjing , China Abstract This paper presents a novel Agent-based peer-to-peer (P2P) Traffic Control Management mechanism (ATCM), which provides a new way for P2P traffic control and management. The realized control system s database records are transferred into XML documents forms, and the Java language and Aglet platform are used for development of mobile agent. Experimental results show that the control system can control the P2P traffic effectively, save network bandwidth, and ensure quality of service (QoS) of other critical business. Keywords: P2P; Traffic Control; Agent; Traffic Management 1. Introduction With the rapid development of Internet, P2P (Peer-to-Peer) technology has become very popular. It is used in many areas including file sharing, instant messaging, search engines, collaborative computing, and distributed computing. Comparing with the traditional centralized client/server (C/S) model, P2P has weakened the concept of the server. The P2P system no longer distinguishes the role of server and client relations of various nodes. Each node can be a server but also a client. In the P2P network, nodes can directly exchange resources and services without going through the central server. In a variety of P2P applications, P2P file sharing system has been occupied the largest proportion traffic of network bandwidth. Because P2P technology has been rapid spread and development, and it becomes the largest consumer of network resources more than the previous Web, , FTP and other data traffic, and becomes the main burden of the network, or even causes network congestion, impacting and reducing the performance of other businesses. According to the related statistics, P2P flow accounted for 70% of the total Internet traffic throughputs [1]. This paper studies the existing P2P traffic detection technology, an agent-based P2P traffic control model and method are proposed, and the experiment results show that the proposed model and method are availability and effective. Related work. In order to control P2P network traffic more reasonably, the first step is to identify the P2P traffic. Various solutions have been developed for P2P traffic classification in recent years. A popular Corresponding author. addresses: [email protected] (He XU) / Copyright 2011 Binary Information Press July, 2011
2 2308 H. Xu et al. /Journal of Computational Information Systems 7:7 (2011) approach is the TCP port based analysis where tools such as Netflow[2] and cflowd[3] are configured to read the service port numbers in the TCP/UDP packet headers, and compare them with the known(default) port numbers of the P2P applications. Then the packets are classified as P2P traffic if a match occurs. Although P2P applications have default port numbers, newer P2P versions allow the user to change the port numbers, or choose a random port number within a specified range. Hence, port based analysis becomes inefficient and misleading. A method using application signatures was developed by S. Sen, O. Spatscheck, and D. Wang in [4], noticing the fact that internet applications have a unique string(signature) located in the data portion of the packet(payload). They used the available information in the proprietary P2P protocol specifications in conjunction with information extracted from packet-level trace analysis to identify the signatures, and classify the packets accordingly. In this case, the traffic that passes through the network is monitored and the data payload of the packets is inspected according to some previously defined application signatures. This approach has been shown to work very well for Internet traffic including P2P applications [5-6]. Nowadays, many researchers turn their attentions to machine learning based approaches for P2P traffic classification, in general it can be divided into two categories: Clustering Approaches, in which EM[7], AutoClass[8], K-Means[1,9] are typical ones; and Supervised Learning, in which naive Bayes[10 13], Bayesian Neural Network[14], Decision Tree[11] are most widely employed. In these researches the statistical characteristics of IP flows are concerned. Flow statistics, such as volume, duration and packet size, are extracted from the network data to establish the feature set. Traffic behavior analysis is another technique which passively checks the network packets and matches them with the pre-defined P2P traffic characteristics. Authors in [15] design a P2P traffic detection framework INFOPAD(Integrated Framework of P2P Traffic Detection) over large scale NetFlow data, which is based on traffic behavior analysis. This paper presents an efficient agent-based traffic control management scheme (ATCM) for P2P traffic to be controlled, which provides a new way for P2P traffic control and management. The system s database records are transferred into XML documents forms, and the Java language and Aglet platform are used for development of mobile agent. Experimental results show that the control system can control the P2P traffic effectively, save network bandwidth, and ensure QoS of other critical business. 2. ATCM: Agent based P2P Traffic Control Model Agent-based traffic control management model (ATCM) for P2P traffic Control is shown in Figure 1, which includes the Manager agent (MA), system information database, P2P flow monitor, information database, trace agent, traffic information collect agent, traffic control agent and agent run environment components. Agent-based computing is an effective paradigm for developing applications in complex domains as it supports the design and implementation of applications in terms of autonomous software entities, or Agents, which can achieve their goals flexibly by interacting with each another through high-level protocols and languages. Agents can also be endowed with a mobility feature which enables them to roam across the network, thus potentially saving network resources, improving performance, and enabling dynamic reconfigurability [16]. Architectures, protocols, and languages for Agents have been subjected to standardization by the Foundation for Intelligent and Physical Agents (FIPA) in response to
3 H. Xu et al. /Journal of Computational Information Systems 7:7 (2011) the interest of telecommunication companies for applying Agents for the intelligent management of networks [17]. Fig.1 Agent-based P2P Traffic Control Model (1) Manager Agent (MA): MA exchanges information with traffic information collect agent and determines whether to limit P2P traffic, if the traffic needs to be restricted then traffic control agent run P2P traffic control procedures. MA manages trace agent and system information database, and provides interfaces between system and network administrator. MA accumulates and assesses the information from the collect agent sent to collect all the information, if the P2P traffic flow information exceeds a certain preset value, MA will notify the traffic control agent to implement P2P traffic control. MA may reside on switch device in each local network. (2) P2P Flow Monitor: Monitor exists in each local network. Through monitoring each network s switch or routing device, it will find whether P2P traffic is existed in the network, and the monitoring results will be reported to MA. The method of P2P traffic identification can be used by the P2P traffic detection technology which is introduced in the section I s related work. (3) Traffic Information Collect Agent: It is mobile, and collects the target network with a variety of P2P-related information (such as IP, communicating port, the use of P2P protocols, etc.), and the results will be returned to MA. (4) System Information Database and Information Database: System information database is located in MA machine, which is used to collect and record all the information from the network, and will track each routing integrate all information of P2P connection. Information database is located in P2P traffic monitor for storing P2P control operation s log. (5) Trace Agent: After P2P traffic monitor device detects P2P traffic, P2P traffic monitor will release trace agent to track the location of each node in the network, and interact with the traffic control agent information in order to facilitate to implementation of the P2P flow control.
4 2310 H. Xu et al. /Journal of Computational Information Systems 7:7 (2011) (6) Traffic Control Agent: Traffic control agent implements specific control strategies, such as restriction of the total P2P traffic, P2P flow rate, based on time stamp, etc, to ensure the QoS of all services in the management network. Fig. 2 P2P Traffic Control Flow Chart Figure 2 is the flow chart of mobile agent-based P2P flow control model. The P2P flow control process is as follows: Step 1. P2P Traffic Monitor opens monitor and detects each data link connection whether it is a P2P connection. Detection method is based on the previous section I which introduces the P2P traffic detection technology. Step 2. If it is the P2P connection, the P2P Traffic Monitor recognizes the connection information of the node (such as IP, communication port and other information) and puts the information into the database, and generates traffic information collection agent, and also transmits this information to MA. Step 3. Based on current network conditions, MA tracks and controls this P2P connection. If the connection does not been tracking then it will be released. If tracking then MA creates trace agent, and puts this connection information to the P2P flow control table, and notifies P2P traffic monitor to run real-time monitoring and controlling. Step 4. After P2P flow monitor receives MA notification information, P2P flow monitor real-time statistics P2P flow information and stores those information into the database, and makes a judge, when more than the limited value and it will notify the flow control agent, then closes this P2P connection, and transmits the related operation information and data to notify P2P traffic information collection agent.
5 H. Xu et al. /Journal of Computational Information Systems 7:7 (2011) Key Technology of ATCM Implementation ATCM uses Jpcap packet capture to analysis data, the Java language and Aglet to design Mobile Agent, and uses XML data access technology to store data Real-time Traffic Data Capture Technology P2P traffic monitor data capture module is the core of the implementation, and it is implemented by using Jpcap [18]. Jpcap is able to crawl and send a network packet by Java components, which can be used through a network interface to send any packets. Jpcap can capture Ethernet, IPv4, IPv6, ARP / RARP, TCP, UDP and ICMPv4 packets. Jpcap call wincap/libcap, and the Java language provides a common interface to achieve the platform independence Secure Mobile Agent Technology Aglet is a pure Java development with IBM for the mobile agent development technology, and provide a practical platform-- Aglet Workbench [19], allow people to develop or implement mobile agent system. It provides a simple and comprehensive programming model for mobile agent, and agent provides a dynamic and effective communication mechanism. It also provides a context to manage Aglet basic behaviors: such as create Aglet, copy or distribute Aglet to the destination machine, recall remote Aglet, suspend or wake Aglet, and remove Aglet and so on. These characteristics meet our proposed ATCM to achieve functional requirements. We use Java language and Aglet to implement mobile agent XML-based Database Access Technology System Information Database and Information Database need support layer for database, in order to be to effectively integrate with Java and the all solution of ATCM, we use XML-based database [20]. The advantage of using XML technology is that the data is exchangeability, and it has the following advantages of data applications: (1) XML file is a pure text file, no operating system and software platform restrictions; (2) XML is based on Schema, which is easy to describe the semantics of data, while the description can be understood and automatic processing by computer; (3) XML can describe structured, semi-structured and unstructured data. Figure 3 is the experimental network topology of the P2P traffic monitor system which is implemented according to the P2P flow control model. In the topology, Peer A and Peer B, Peer C and Peer D are belonging to a different network segment. In the experiment, Peer A and Peer C use P2P software (such as BitTorrent, emule, etc.) to download the same video compression package files, while Peer B and Peer D use FTP downloads and Web access operation simultaneously; P2P traffic monitoring server A opens monitoring, and P2P traffic monitoring server B closes monitoring. Deep Packet Inspection (DPI) technology [21] is used in the experiment on the P2P traffic information statistic. Experiment compares the download traffic of the router R1 and router R2, and the download rate of Peer A and Peer C. Performance results are shown in Figure 4 and Figure 5.
6 2312 H. Xu et al. /Journal of Computational Information Systems 7:7 (2011) Experimental Results and Discussions As can be seen from Figure 4, the growth of download traffic of Router 1 which opens the P2P flow control is smaller than that of Router 2 which without open P2P flow control; As also can be seen from Figure 5, the download rate of Peer A is smaller than that of Peer C, because in the beginning 3 minutes of the start download time, while P2P clients stay in the stage of finding resources, the download rate of Peer A and Peer C are little difference, with the P2P client to find a lot of resources, after 3 minutes later, the download rate of the Peer C increases rapidly in the segment of not opening P2P flow control, and he download rate of the Peer A did not change significantly because it locates in the segment of opening P2P flow control. Fig. 3 Network Topology Fig. 4 Routers Download Traffic Fig.5 Peers Download Rate Experimental results show that the mobile agent based P2P traffic control system can achieve the purpose of controlling P2P traffic, make a lot of P2P traffic bandwidth down, ensure that other applications traffic would be enhanced, and so as to effectively guarantee quality of service (QoS) of other network applications.
7 H. Xu et al. /Journal of Computational Information Systems 7:7 (2011) Conclusions and Future Work This paper presents an efficient agent-based traffic control management mechanism (ATCM) for P2P traffic, which uses mobile agent s mobility, autonomy and intelligence, etc. Our scheme provides a new way for P2P traffic control and management. In the system s implementation, the database records is transferred into XML documents forms, and the Java language and Aglet platform are used for development of mobile agent. Experimental results show that the control system can control the P2P traffic effectively, improve the flow distribution in P2P network, save network bandwidth, and ensure quality of service of other critical business. As a result, ATCM eliminates the complexity of the original flow control, achieves a better control of P2P traffic, and the scheme is easy to be deployed in the Internet environment. However, because of P2P protocol s multiplicity, it is difficult to identification P2P traffic, thus how to detection P2P flow are the main work to do in the future work. Acknowledgement The subject is sponsored by the National Natural Science Foundation of P. R. China ( ) Scientific & Technological Support Project (Industry) of Jiangsu Province (No. BE ,BE ) The Special Foundation for Development of Modern Service Industry of Jiangsu Province Project sponsored by Jiangsu provincial research scheme of natural science for higher education institutions (10KJB KJB520014) Scientific Research & Industry Promotion Project for Higher Education Institutions(JH10-14) Postdoctoral Foundation ( B) Science & Technology Innovation Fund for higher education institutions of Jiangsu Province (CX10B-196Z,CX10B-197Z,CX10B-198Z,CX10B-199Z,CX10B-200Z) the six kinds of Top Talent of Jiangsu Province ( ) Doctoral Fund of Ministry of Education of China ( ) and key Laboratory Foundation of Information Technology processing of Jiangsu Province (KJS1022). The authors would like to thank the editor and the anonymous reviewers, who provide insightful and constructive comments for improving this paper. References [1] J. Erman, A. Mahanti, M. Arlitt, et al. Identifying and discriminating between web and peer-to-peer traffic in the network core. Proceedings of the 16th international conference on World Wide Web(WWW 2007), pages , [2] S. Kamei and T. Kimura. Cisco IOS NetFlow Overview. Whitepaper, available at Cisco Systems Inc [3] M. Crovella and B. Krishnamurthy. Internet measurement: infrastructure, traffic and applications. John Wiley and Sons Ltd.West Sussex, England, [4] S. Sen, O. Spatscheck, and D. Wang. Accurate, Scalable In Network Identification of P2P Traffic using Application Signatures. Proceedings of the 13th International World Wide Web Conference, pages , [5] P. Haffner, S. Sen, O. Spatscheck, and D. Wang. Acas:Automated construction of application signatures. In Proceedings of the SIGCOMM05 Workshops, [6] T. Karagiannis, A. Broido, M. Faloutsos and K. Claffy. Transport layer identification of P2P traffic. In Proceedings of the ACM SIGCOMM Internet Measurement Conference, pages , [7] A. McGregor, M. Hall, P. Lorier, et al. Flow clustering using machine learning techniques. In PAM Antibes Juan-les-Pins, France, April, [8] A. Zander, T. Nguyen, G. Armitage. Automated traffic classification and application identification using machine learning. In LCN 2005, Sydney, Australia, pages , [9] L. Bernaille, R. Teixeira, I. Akodkenou. Traffic classification on the fly. ACM SIGCOMM Comput Commun
8 2314 H. Xu et al. /Journal of Computational Information Systems 7:7 (2011) Review, 36(2): 23-26, [10] A. W. Moore, D. Zuev. Internet traffic classification using Bayesian analysis techniques. In ACM SIGMETRICS 2005, pages 50-60, [11] J. Park, H. R. Tyan, C. Kuo. Internet traffic classification for scalable QoS provision. In 2006 IEEE International Conference on Multimedia and Expo. Toronto, Ontario, Canada, pages , [12] T. Nguyen, G. Armitage. Training on multiple sub-flows to optimize the use of Machine Learning classifiers in real-world IP networks. In LCN 2006, Tampa, Florida,USA, pages , [13] D. Bonfiglio, M. Mellia, M. Meo, et al. Revealing Skype traffic: when randomness plays with you. In SIGCOMM 07. New York, NY, USA, August. pages 37-38, [14] T. Auld, A. W. Moore, S. F. Gull. Bayesian neural networks for Internet traffic classification. IEEE Trans Neural Netw, 18(1): , [15] R. Zhang, J. Chang, H. Zhou, et al. P2P traffic detection on large scale netflow data. Journal of Computational Information Systems, 4(2): , [16] M. Luck, P. McBurney, C. Preist, A manifesto for agent technology: Towards next generation computing. Autonomous Agents and Multi-Agent Systems, 9 (3): , [17] G. Fortino, W. Russo. Using P2P, GRID and Agent technologies for the development of content distribution networks. Future Generation Computer Systems, 24: , [18] Z. H. Shen, H. Wang. Network Data Packet Capture and Protocol Analysis on Jpcap-Based. Proceedings of the 2009 International Conference on Information Management, Innovation Management and Industrial Engineering, USA: IEEE COMPUTER SOC, 3: , [19] D. B. Lange, D. T. Chang. IBM Aglets Workbench Programming Mobile Agents in Java. White Paper, Japan: IBM Corporation, [20] B. Mclaughlin. Java & XML, 2nd Edition. O'Reilly Media, Inc., [21] S. Sen, J. Wang. Analyzing Peer-to-Peer Traffic Across Large Networks. IEEE/ACM Transactions on Networking, 12(2): , 2004.
Encrypted Internet Traffic Classification Method based on Host Behavior
Encrypted Internet Traffic Classification Method based on Host Behavior 1,* Chengjie GU, 1 Shunyi ZHANG, 2 Xiaozhen XUE 1 Institute of Information Network Technology, Nanjing University of Posts and Telecommunications,
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab
Using UDP Packets to Detect P2P File Sharing
188 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 27 Using UDP Packets to Detect P2P File Sharing Tsang-Long Pao and Jian-Bo Chen Tatung University, Taipei,
Traffic Classification with Sampled NetFlow
Traffic Classification with Sampled NetFlow Valentín Carela-Español, Pere Barlet-Ros, Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {vcarela,pbarlet,pareta}@ac.upc.edu Abstract The traffic
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
How To Classify Network Traffic In Real Time
22 Approaching Real-time Network Traffic Classification ISSN 1470-5559 Wei Li, Kaysar Abdin, Robert Dann and Andrew Moore RR-06-12 October 2006 Department of Computer Science Approaching Real-time Network
Traffic Analysis of Mobile Broadband Networks
Traffic Analysis of Mobile Broadband Networks Geza Szabo,Daniel Orincsay,Balazs Peter Gero,Sandor Gyori,Tamas Borsos TrafficLab, Ericsson Research, Budapest, Hungary Email:{geza.szabo,daniel.orincsay,
Forensic Network Traffic Analysis
Forensic Network Traffic Analysis Noora Al Khater Department of Informatics King's College London London, United Kingdom [email protected] Richard E Overill Department of Informatics King's College
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
Near Real Time Online Flow-based Internet Traffic Classification Using Machine Learning (C4.5)
Near Real Time Online Flow-based Internet Traffic Classification Using Machine Learning (C4.5) Abuagla Babiker Mohammed Faculty of Electrical Engineering (FKE) Deprtment of Microelectronics and Computer
Research on Video Traffic Control Technology Based on SDN. Ziyan Lin
Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) Research on Video Traffic Control Technology Based on SDN Ziyan Lin Communication University of China, Beijing
Peer to peer networking: Main aspects and conclusions from the view of Internet service providers
Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Gerhard Haßlinger, Department of Computer Science, Darmstadt University of Technology, Germany Abstract:
A Scheme for Implementing Load Balancing of Web Server
Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public
Network congestion control using NetFlow
Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.
Packet Flow Analysis and Congestion Control of Big Data by Hadoop
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.456
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Lecture 28: Internet Protocols
Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further
A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification
A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification Riyad Alshammari and A. Nur Zincir-Heywood Dalhousie University, Faculty of Computer Science {riyad, zincir}@cs.dal.ca
Classifying P2P Activity in Netflow Records: A Case Study on BitTorrent
IEEE ICC 2013 - Communication Software and Services Symposium 1 Classifying P2P Activity in Netflow Records: A Case Study on BitTorrent Ahmed Bashir 1, Changcheng Huang 1, Biswajit Nandy 2, Nabil Seddigh
Online Classification of Network Flows
2009 Seventh Annual Communications Networks and Services Research Conference Online Classification of Network Flows Mahbod Tavallaee, Wei Lu and Ali A. Ghorbani Faculty of Computer Science, University
Realtime Classification for Encrypted Traffic
Realtime Classification for Encrypted Traffic Roni Bar-Yanai 1, Michael Langberg 2,, David Peleg 3,, and Liam Roditty 4 1 Cisco, Netanya, Israel [email protected] 2 Computer Science Division, Open University
Hadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
Scalable Extraction, Aggregation, and Response to Network Intelligence
Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks
1 Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks Leonardo Ochoa-Aday, Cristina Cervello -Pastor, Member, IEEE, and Adriana Ferna ndez-ferna ndez Abstract The explosion
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS
ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management
Question: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
Computer Networks & Security 2014/2015
Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!
From Centralization to Distribution: A Comparison of File Sharing Protocols
From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
SPECIAL FEATURES OF TCP/IP NETWORK TRAFFIC AND PROBLEMS OF THE PROGRAM MONITORING. (1)Radi ROMANSKY
1 SPECIAL FEATURES OF TCP/IP NETWORK TRAFFIC AND PROBLEMS OF THE PROGRAM MONITORING (1)Radi ROMANSKY (1)Department of Computer Systems, Technical University Sofia e-mail address: [email protected] Bulgaria
Industrial Communication Whitepaper. Principles of EtherNet/IP Communication
Industrial Communication Whitepaper Principles of EtherNet/IP Communication 1 Contents Introduction...3 Producer/Consumer Model...4 EtherNet/IP Messaging Types...7 Real Time Data Exchanges...9 Typical
Overview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
IPv6 First Hop Security Protecting Your IPv6 Access Network
IPv6 First Hop Security Protecting Your IPv6 Access Network What You Will Learn This paper provides a brief introduction to common security threats on IPv6 campus access networks and will explain the value
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill
Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET
inet Enterprise Features Fact Sheet
2007 inet Enterprise Features Fact Sheet inetmon Sdn. Bhd. 1010 & 1011, Tingkat 10 Blok D, Dataran Usahawan Kelana,17, Jalan SS 7/26, Kelana Jaya, 47301 Petaling Jaya, Selangor Darul Ehsan Tel: 603-7880
Cover. White Paper. (nchronos 4.1)
Cover White Paper (nchronos 4.1) Copyright Copyright 2013 Colasoft LLC. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced
Network Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
CMA5000 SPECIFICATIONS. 5710 Gigabit Ethernet Module
CMA5000 5710 Gigabit Ethernet Module SPECIFICATIONS General Description The CMA5710 Gigabit Ethernet application is a single slot module that can be used in any CMA 5000. The Gigabit Ethernet test module
A Network Simulation Experiment of WAN Based on OPNET
A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,[email protected] *2
Bandwidth Management for Peer-to-Peer Applications
Overview Bandwidth Management for Peer-to-Peer Applications With the increasing proliferation of broadband, more and more users are using Peer-to-Peer (P2P) protocols to share very large files, including
Network Traceability Technologies for Identifying Performance Degradation and Fault Locations for Dependable Networks
Network Traceability Technologies for Identifying Performance Degradation and Fault Locations for SHIMONISHI Hideyuki, YAMASAKI Yasuhiro, MURASE Tsutomu, KIRIHA Yoshiaki Abstract This paper discusses the
Identifying Peer-to-Peer Traffic Based on Traffic Characteristics
Identifying Peer-to-Peer Traffic Based on Traffic Characteristics Prof S. R. Patil Dept. of Computer Engineering SIT, Savitribai Phule Pune University Lonavala, India [email protected] Suraj Sanjay Dangat
Internet Traffic Measurement
Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software
CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture
Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands [email protected]
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
Experimentation driven traffic monitoring and engineering research
Experimentation driven traffic monitoring and engineering research Amir KRIFA ([email protected]) 11/20/09 ECODE FP7 Project 1 Outline i. Future directions of Internet traffic monitoring and engineering
A Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Local-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,
Classifying Service Flows in the Encrypted Skype Traffic
Classifying Service Flows in the Encrypted Skype Traffic Macie Korczyński and Andrze Duda Grenoble Institute of Technology CNRS Grenoble Informatics Laboratory UMR 5217 Grenoble France. Email: [macie.korczynski
The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang
International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang Nanjing Communications
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
and reporting Slavko Gajin [email protected]
ICmyNet.Flow: NetFlow based traffic investigation, analysis, and reporting Slavko Gajin [email protected] AMRES Academic Network of Serbia RCUB - Belgrade University Computer Center ETF Faculty
PART III. OPS-based wide area networks
PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need
A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming
A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming Chin Yong Goh 1,Hui Shyong Yeo 1, Hyotaek Lim 1 1 Dongseo University Busan, 617-716, South Korea [email protected], [email protected],
Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0
Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0 Abstract Avaya IP Softphone R3 V2.1 now supports H.323 VoIP applications running over different
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
Network Protocol Configuration
Table of Contents Table of Contents Chapter 1 Configuring IP Addressing... 1 1.1 IP Introduction... 1 1.1.1 IP... 1 1.1.2 IP Routing Protocol... 1 1.2 Configuring IP Address Task List... 2 1.3 Configuring
Data Communication and Computer Network
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
The Applications of Deep Learning on Traffic Identification
The Applications of Deep Learning on Traffic Identification Zhanyi Wang [email protected] Abstract Generally speaking, most systems of network traffic identification are based on features. The features
Content-Aware Load Balancing using Direct Routing for VOD Streaming Service
Content-Aware Load Balancing using Direct Routing for VOD Streaming Service Young-Hwan Woo, Jin-Wook Chung, Seok-soo Kim Dept. of Computer & Information System, Geo-chang Provincial College, Korea School
HP IMC User Behavior Auditor
HP IMC User Behavior Auditor Administrator Guide Abstract This guide describes the User Behavior Auditor (UBA), an add-on service module of the HP Intelligent Management Center. UBA is designed for IMC
LAN Switching and VLANs
26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access
EXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
Software Defined Networking (SDN) - Open Flow
Software Defined Networking (SDN) - Open Flow Introduction Current Internet: egalitarian routing/delivery based on destination address, best effort. Future Internet: criteria based traffic management,
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION MATIJA STEVANOVIC PhD Student JENS MYRUP PEDERSEN Associate Professor Department of Electronic Systems Aalborg University,
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
Distributed Systems. 2. Application Layer
Distributed Systems 2. Application Layer Werner Nutt 1 Network Applications: Examples E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Social
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
QRadar Security Intelligence Platform Appliances
DATASHEET Total Security Intelligence An IBM Company QRadar Security Intelligence Platform Appliances QRadar Security Intelligence Platform appliances combine typically disparate network and security management
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
Enlarge Bandwidth of Multimedia Server with Network Attached Storage System
Enlarge Bandwidth of Multimedia Server with Network Attached Storage System Dan Feng, Yuhui Deng, Ke Zhou, Fang Wang Key Laboratory of Data Storage System, Ministry of Education College of Computer, Huazhong
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
P2P VoIP for Today s Premium Voice Service 1
1 P2P VoIP for Today s Premium Voice Service 1 Ayaskant Rath, Stevan Leiden, Yong Liu, Shivendra S. Panwar, Keith W. Ross [email protected], {YongLiu, Panwar, Ross}@poly.edu, [email protected]
