Watching the IPv6 Takeoff from an IXP s Viewpoint
|
|
|
- Olivia Campbell
- 10 years ago
- Views:
Transcription
1 Forschungsberichte der Fakultät IV Elektrotechnik und Informatik Watching the IPv Takeoff from an IXP s Viewpoint Juhoon Kim Nadi Sarrar Anja Feldmann Technische Universität Berlin Technical Report Bericht-Nummer: 0-0 ISSN: Februar 0
2
3 Watching the IPv Takeoff from an IXP s Viewpoint Juhoon Kim TU-Berlin Berlin, Germany [email protected] Nadi Sarrar TU-Berlin Berlin, Germany [email protected] Anja Feldmann TU-Berlin Berlin, Germany [email protected] Abstract The different level of interest in deploying the new Internet address space across network operators has kept IPv tardy in its deployment. However, since the last block of IPv addresses has been assigned, Internet communities took the concern of the address space scarcity seriously and started to move forward actively. After the successful IPv test on June, 0 (World IPv Day []), network operators and service/content providers were brought together for preparing the next step of the IPv global deployment (World IPv Launch on June, 0 []). The main purpose of the event was to permanently enable their IPv connectivity. In this paper, based on the Internet traffic collected from a large European Internet Exchange Point (IXP), we present the status of IPv traffic mainly focusing on the periods of the two global IPv events. Our results show that IPv traffic is responsible for a small fraction such as 0.5 % of the total traffic in the peak period. Nevertheless, we are positively impressed by the facts that the increase of IPv traffic/prefixes shows a steep increase and that the application mix of IPv traffic starts to imitate the one of IPv-dominated Internet. I. INTRODUCTION Although designing a new Internet protocol was not the most pressing matter within the Internet community in the beginning of the 990s, the unforeseen growing speed of the Internet usage had started to cause worries about the exhaustion of the Internet address space. Despite these concerns, the exhaustion of the current Internet address space (IPv) became inevitable due to the consequence of overstaying in the decision process of the movement to the new Internet address space (IPv [3]). Even though the optimistic prediction of the Internet growth was one of the major mistakes made in the beginning of its evolution, Internet pioneers are not to be blamed because it was nearly impossible to expect such a massive success of the Internet at that point in time. Internet Protocol Version (IPv) has been developed by the Internet Engineering Task Force (IETF) in 99 with a view to succeeding the current version of Internet Protocol (IPv). Besides the expansion of the address space, developers of IPv took several demanding features such as the security (based on compliance with IPSec), Quality of Service (QoS, via the prioritization scheme and the non-fragmentation principle), and the extensibility (using the chain header) into the design consideration, while maintaining the simplicity of its predecessor (IPv). Even with such promising functionalities network operators and software developers were not motivated enough to adopt the new version of the Internet protocol because the current version of the Internet protocol is irreproachable and it was still too early to feel the scarcity of the address space in their bones. Furthermore, it was commonly acknowledged that inequalities of the benefit of and the demand for the new Internet protocol among network operators made it difficult to adopt IPv all together. However, the situation has changed since the last block of the IPv addresses has been assigned to the RIRs in mid-0. Soon after the IPv address depletion of the Internet Assigned Numbers Authority (IANA), Asia Pacific Network Information Centre (APNIC) reported that they reached the final stage of the IPv exhaustion []. After all, major network operators nodded at an implicit agreement that there is no more time to calculate gains and losses. To this end, the Internet Society [5] organized a -hour global IPv test flight (World IPv Day []) on June, 0 and more than a thousand globally influential service providers have participated in the event. As no severe problems have been reported from participants, the community has decided to move a step forward, which is the World IPv Launch [] event held on June, 0. The World IPv Launch event was expected to be an important turning point in the Internet history, because participants agreed to keep their IPv connectivity permanently enabled after the event. In this paper, we study the changes to the IPv traffic from the viewpoint of a large European Internet Exchange Point (IXP). We analyze months worth of traffic traces which include the two world IPv events. The remainder of this paper is structured as follows. We first illustrate the vantage point of our measurement and traffic data sets in Section II. The methodology used for conducting our measurement is described in Section III. Then, we show the characteristics of the current IPv traffic observed in our measurement in Section IV. After that, we select publicly available reports about the current status of the adoption of IPv and summarize them in Section V. We overview the related work in Section VI. Finally, we conclude the paper in Section VII. II. MEASUREMENT ENVIRONMENT AND TRACES In this section, we give a brief overview of our data sets and describe the vantage point that our data is collected from. A. Internet exchange Point (IXP) An Internet exchange Point (IXP) is a physical infrastructure for interconnecting Internet Service Providers (ISPs) and ASes in order to reduce the end-to-end latency and the cost
4 AS AS AS 3 IXP AS AS 5 AS Fig. : A simplified IXP topology TABLE I: Data sets. Name Period Global IPv Event IXP-vday Jun. 5, 0 Jun. 5, 0 World IPv Day IXP-newyear Dec. 5, 0 Jan. 7, 0 IXP-launch Jun., 0 Jun., 0 World IPv Launch IXP-olympics Aug., 0 Aug. 30, 0 K 9K K 7K K 5K K 3K K K 0 The number of announced IPv sitesk Announced IPv Prefixes Announced IPv ASNs Observed IPv Prefixes in IXP Observed IPv ASNs in IXP Year World IPv Day World IPv Launch Day Fig. : The growth of the IPv routing table since 005 (shorter lines are the observation from our data sets during months of measurement period). Lines from RouteViews data are plotted in monthly intervals and lines from IXP data are plotted five times within the period (each point represents the number of prefixes and ASes observed within the corresponding traffic data set). of transit traffic. A simplified topology of an IXP is illustrated in Fig.. Through such infrastructures, its member ASes can establish peering (or transit) relationships with other member ASes. The volume of daily network traffic at an IXP depends, amongst other things, on the number of networks connected to the IXP. Our IXP has more than 00 members which makes it one of the largest IXPs in Europe. For a detailed analysis of the IXP ecosystem and the peering behavior of the IXP participants we refer to []. B. Data Sets We base our measurement on four sets of traffic traces (see Table I) collected within the above-mentioned IXP during a time span of months including World IPv Day and World IPv Launch (5 days of traffic in total). Note that one of our data sets (IXP-vday) overlaps the one used in Sarrar et al. [7]. Due to the immense amount of traffic volume, it is considered to be virtually impossible to capture and store all packets. To this end, we collect our data using sflow, i. e., a network traffic sampling technology designed to provide a scalable monitoring solution with low costs, with the sampling rate of :k. By the reasons of the space constraint and the privacy concern, we only record the first bytes of the sampled packets. However, it is sufficient to include all relevant information that we rely on, e. g., IP headers, tunneling headers, and transport layer protocol headers. A sampled packet is pipelined to the anonymization process before being stored to disk for the purpose of muddling all IP addresses of the packet, while the consistency of an IP address and the size of the network prefix are preserved. III. METHODOLOGY In order to conduct our measurement, we develop an IPv traffic analysis tool to which text-formatted information ex- tracted from sflow traces is fed. Our analysis tool is designed to identify IPv packets and to extract relevant information from the identified IPv packets. The tool identifies the transition technology in the current measurement point (IXP) by observing the packet s IP version field, protocol number, and port numbers. For this, we use the protocol number as a clear indicator of in [] technology and the protocol number 7 combined with the UDP port number 35 as a clear evidence of teredo [9] technology. In the same manner, ayiya [] technology can be identified by using the protocol number 7 and the UDP port number 507. However, we do not consider the ayiya transition technology in our study since we observe only the negligible fraction (<0. %) of IPv traffic over ayiya. Indeed, teredo and in are the only transition technologies carrying a considerable amount of IPv traffic. IV. EVALUATION In this section, we evaluate the change in the level of IPv deployment with emphasis on the impact of the two past global IPv events (World IPv Day and World IPv Launch). In general, we observe that IPv accounts for 0.5 % of the total Internet traffic in the peak period (IXP-olympics) of our measurement results. A. Quantitative Analysis of IPv Traffic In order to see how the level of IPv adoption has been evolving, we download monthly snapshots of the IPv routing table from the RouteViews Project [] and illustrate them in Fig. together with the observed IPv prefixes within our data sets. The figure shows the sharp rise in the number of announced IPv network prefixes since the World IPv Day. More precisely, the number of IPv network prefixes announced between the World IPv Day period and the World
5 IPv Traffic (in Gb/s) World IPv Day native in teredo World IPv Lauch Day IPv Traffic (in packets) 0 0K 300K 500K 700K World IPv Day native in teredo World IPv Lauch Day IXP vday IXP newyear IXP launch IXP olympics IXP vday IXP newyear IXP launch IXP olympics (a) IPv traffic volume (b) IPv packet counts Fig. 3: IPv traffic changes. IPv Launch period (one year) is almost equivalent to the total number of prefixes evolved during the last two decades. Even though we observe only half of the globally announced IPv prefixes at our vantage point, the increasing rate is still significant. When seeing the change of the IPv adoption in the perspective of the traffic volume, the increase of IPv traffic is even more drastic than the one shown in the prefix data. As we see in Fig. 3, IPv traffic is increased by more than 50 % on the World IPv Day. Moreover, the volume of IPv traffic is again doubled (approximately from 3Gb/s to Gb/s) within the World IPv Launch period. The growth of IPv traffic is still observed in our latest data set (IXP-olympics). The most significant change that we can discover from the figure is that the increase of IPv traffic mainly results from native IPv traffic. On the World IPv Day, we see more than twice the volume of native IPv traffic and it does not decrease after the event (even though it was supposed to be a -hour test flight). Besides, another multi-fold increase of native IPv traffic is experienced in the World IPv Launch period. With regard to the sudden peak of teredo packets observed on January, 0 (see Fig. 3 (b)), we do not have a clear answer for this phenomenon. However, we are of the strong belief that the cause of this peak is rather due to academic/industrial experiments than due to the participation in the World IPv Launch event. This assumption is based on three different observations. First, the number of teredo packets falls back to the normal level in the World IPv Launch period. Second, more than 0 % of the total teredo packets within the period are generated from a few IP addresses within the same IP prefix. Third, most of the teredo packets are bubble packets in which there is no actual payload present. Next, we evaluate how IPv traffic is distributed across prefixes. Fig. shows a Cumulative Distribution Function (CDF) of IPv traffic contributed by the top-0 IPv prefixes. Solid lines in the figure indicate the traffic fraction of the prefix out of the total observed IPv traffic, while dashed lines A teredo bubble is a signaling packet typically used for creating and maintaining a NAT mapping CDF Top 0 IPv prefixes ordered by traffic volume Total Traffic (IXP vday) Total Traffic (IXP launch) Total Traffic (IXP olympics) Outgoing Traffic (IXP vday) Outgoing Traffic (IXP launch) Outgoing Traffic (IXP olympics) Fig. : CDF of IPv traffic contributed by the top-0 prefixes. The prefixes on the x-axis are sorted by the IPv traffic contribution from left to right in descending order. A logarithmic scale is used on the x-axis to clearly identify points of the top prefixes. describe only the fraction of outgoing IPv traffic. The figure shows that about % (50 prefixes in IXP-vday and 0 prefixes in IXP-launch and IXP-olympics) of the observed prefixes contribute more than 90 % of the total IPv traffic. Moreover, almost 30 % (IXP-vday and IXP-launch) and 0 % (IXP-olympics) of the total traffic is contributed by a single prefix. Given the fact that almost all traffic of the prefix is outgoing traffic in IXP-vday and IXP-launch, we conclude (and also verify) that the top IPv contributor in these periods is a content provider. However, by observing the ratio between incoming traffic and outgoing traffic of the top prefix in IXP-olympics, it appears likely that the first position in the traffic ranking is now taken by a large transit network. Indeed, by further dataset inspections we confirm the following assumption: The identified transit network is one of the largest IPv backbone network in the world. Yet, readers must note that this evaluation is based on network prefixes. When prefixes are aggregated into the AS
6 level, the content provider (the top IPv traffic contributor in IXP-vday and IXP-launch) is still the largest IPv traffic contributor in terms of the traffic volume. B. Application Breakdown In this section, we provide insights into the application mix in IPv traffic. Fig. 5 shows the breakdown of the traffic into applications. Note that the header size of transition technologies is included in the traffic volume. Hence, we see a significant fraction of teredo traffic in the figure even though teredo bubbles do not contain any actual payload. The first application protocol that we need to pay attention to is the Network News Transport Protocol (NNTP). Even though the significance of NNTP traffic within the IPv network decreases drastically as the influence of web traffic increases, it is important to understand its characteristics since NNTP has been the dominant content carrier in the IPv world before HTTP became the major protocol and it is still responsible for a considerable fraction of the IPv traffic. NNTP has been considered an obsolete protocol for a while, however recent measurement studies [] have found that NNTP revives (or survives) from its oblivion. They report that NNTP accounts for up to 5 % of the total residential traffic in today s Internet. More surprisingly, Sarrar et al. [7] report that almost 0 % of the total IPv traffic is contributed by NNTP before the World IPv Day. Our result shows a significantly different fraction (about 0 %) of NNTP traffic in the same period, but this is due to the fact that we consider the header bytes of the transition technologies as part of the application s traffic volume. When considering only the payload, our evaluation matches the one reported in [7]. The next application protocol that we study is HTTP. As the figure shows, the fraction of web traffic increases remarkably on the World IPv Day and it reaches nearly 50 % of the total IPv traffic in the World IPv Launch period. The change of the traffic shape has a particular meaning since the breakdown of IPv traffic into applications becomes similar to the one of today s IPv traffic. Furthermore, the major share of IPv traffic is real content rather than signaling traffic. This leads us to the conclusion that service providers start to break away from the fixed idea that IPv is a faraway story and become more active in providing Internet access through IPv to their home and enterprise customers. C. Native IPv Traffic Among ASes We now investigate how native IPv traffic is exchanged among ASes. For this study, we create a traffic matrix with sorted ASes as columns and rows (more than 3,500 ASes). Fig. depicts the cumulative fraction of native IPv traffic of AS-flows 3. In the figure, we only consider AS-flows which contribute at least 0.00 % of the total native IPv traffic, i. e.,,3 AS-flows in IXP-vday,,7 AS-flows A teredo bubble is a signaling packet typically used for creating and maintaining a NAT mapping 3 We define an AS-flow as an asymmetric pair of ASes Fraction of traffic 0% 90% 0% 70% 0% 50% 0% 30% 0% % 0% World IPv Day World IPv Lauch Day IXP vday IXP newyear IXP launch IXP olympics other teredo (bubble) icmp dns nntp web <= Fig. 5: Application breakdown. Traffic volume includes the size of encapsulation headers. in IXP-launch, and,9 AS-flows in IXP-olympics. The figure describes that the traffic fraction of AS-flows increases remarkably in the World IPv Launch period. Interestingly, the amount of IPv traffic is largely concentrated in one AS-flow (i. e., the AS-flow numbered as on the x-axis). However, the traffic contribution of this top AS-flow decreases from.9 % (IXP-launch) to 7. % (IXP-olympics), while the traffic share of those in the bottom 9 % of IXP-olympics outperforms that of IXP-launch. From this result, we can infer that the IPv traffic relationship among ASes slowly changes from a -n shape to a n-n shape. This phenomenon is likely related to the rapid growth of the transit network explained in reference to Fig.. Before providing more information of this specific AS-flow, we narrow the scope of our investigation. For doing so, we illustrate the matrix of the native IPv traffic fraction among the top-5 ASes in Fig. 7. The cell in the figures are filled with different levels of color depth according to their share in the total native IPv traffic. Sums of IPv traffic transmitted among these top-5 ASes are. %, 30. %, and % in IXP-vday, in IXP-launch, and in IXP-olympics, respectively. Readers might notice by the intuition that the cell filled with the deepest color in Fig. 7 (b) and Fig. 7 (c), i. e., ones representing the fraction of traffic originating from the AS numbered as (x-axis) and destining for the AS numbered as (y-axis), are corresponding to the largest AS-flow discussed in regard to Fig.. Furthermore, we can determine that the AS numbered as is the major source of IPv contents. Adding up all native IPv traffic generated from this specific AS, we find that 5. % (IXP-vday), 9.93 % (IXP-launch), and 7. % (IXP-olympics) originate from that single AS. From a closer inspection of that AS, we identify that this AS belongs to one of the largest content providers in the world. This might not be an eye-opener for readers because the consumer behavior of Internet contents in the IPv world cannot be very different from the one within the IPv world. However, we believe that by studying these trends in IPv traffic and >
7 Top 5 ASes. % of total native IPv traffic Top 5 ASes 30. % of total native IPv traffic Top 5 ASes % of total native IPv traffic Destination ASes (ordered by the total traffic contribution) Destination ASes (ordered by the total traffic contribution) Destination ASes (ordered by the total traffic contribution) Source ASes (ordered by the total traffic contribution) Source ASes (ordered by the total traffic contribution) Source ASes (ordered by the total traffic contribution) (a) IXP-vday (b) IXP-launch (c) IXP-olympics Fig. 7: Traffic among top-5 ASes. ASes are sorted from left to right on the x-axis (from bottom to top on the y-axis) by the volume of contributing native IPv traffic in descending order. Cumulative fraction of native IPv traffic 50% 0% 30% 0% % 0% IXP launch IXP olympics IXP vday 0 00 AS Flows Fig. : Cumulative fraction of native IPv traffic from an AS to another AS (AS-flow). Only AS-flows contributing more than 0.00 % of total native IPv traffic are considered. Links are sorted from left to right by the amount of traffic in descending order. their core content providers we can help network operators to come up with more effective strategies for implementing IPv in their networks. Readers may still wonder about the identity of the AS in which the most IPv traffic from the top content provider is consumed (the AS numbered as in Fig. 7). Regarding the largest AS-flow which is shown in Fig. and is also illustrated as the cell filled with the deepest color in Fig. 7, we reveal that the top IPv traffic consumer in our measurement is one of the largest ISPs located in Romania. This is a somewhat unexpected discovery for us since Romania has not engaged any appreciable attentions in the Internet history before. Taking a closer look at the traffic of this specific ISP in the peak period of our IPv traffic (IXP-olympics), approx. 3.0 % of the total native IPv traffic is going out from this AS, while about.3 % of the total traffic is going into the AS. V. PUBLIC REPORTS ON IPV TRAFFIC Various content providers and service providers have been reporting the status of IPv traffic shown in their networks. In this section, we select three relevant reports and summarize them in relation to our measurement results. A. Google Google has been collecting the statistics about the IPv connectivity of their users and reporting the results since 00 [3]. They claim that 0.3 % of the total users have accessed their website over IPv on the World IPv Day and the fraction has increased to 0.5 % on the World IPv Launch. Given the fact that Google is the top ranked website in terms of the number of visitors and the traffic volume, these fractions indicate a considerable number of users. Our measurement witnesses that Google is one of the biggest sources of IPv traffic. Another observation they have made is that since March 0 the fraction of IPv users of the native IPv technology has overtaken the one of encapsulation technologies, i. e., teredo and in. According to their report, the tendency of the decrease in users of transition technologies becomes more drastic over time. As a result, the share of users behind transition technologies decreases from.7 % (World IPv Day) to.5 % (World IPv Launch) of the total IPv users. Although our observation is based on the traffic volume, we confirm the tendency of the native IPv domination. More precisely, we see that the fraction of IPv traffic transferred with transition technologies decreases from 55.9 % (World IPv Day) to.7 % (World IPv Launch). From our measurement viewpoint, the amount of native IPv traffic has begun to outstrip the amount of IPv traffic via transition technologies since the World IPv Day. B. Hurricane Electric Hurricane Electric is a global Internet backbone and one of the largest networks in terms of the number of customers as well as the largest IPv network in terms of the number of connected networks. According to the report of Hurricane Electric [], in the middle of 0, 5. % of the global
8 Top Level Domains (TLDs) have IPv name servers. In an investigation of the top,000 Usenet servers, they find out that. % of them have IPv addresses. Given the fact that the Network News Transport Protocol (NNTP, the protocol used for Usenet) accounts for up to 5 % of the residential network traffic [], the reported number of IPv-enabled Usenet servers may produce a substantial fraction of IPv traffic. Indeed, Sarrar et al. [7] report that almost 0 % of the total IPv is NNTP traffic before World IPv Day. We also observe a considerable amount of NNTP traffic from our measurement. C. APNIC The Asia Pacific Network Information Centre (APNIC) is the first regional Internet registry whose IPv address pool has been exhausted. APNIC measures the deployment level of IPv based on the IPv preference for IPv addresses using the BGP data. APNIC s report describes that Europe has the highest IPv preference (0.5 in July, 0) for IPv addresses among all continents. With the same metric, they report that Romania is the highest ranked country in the world. Similarly, the snapshot of Google s IPv statistics in the same period shows that.3 % of their users from Romania access the website using IPv which is the highest number among all countries. We confirm that more than 7 % of the total IPv traffic in the peak period of our measurement is contributed by a Romanian ISP. VI. RELATED WORK Most of the studies made before the announcement of the name space exhaustion focused mainly on performance analyses of various transition techniques [5], IPv vs IPv comparison [], and the deployment level of IPv based on the address reachability [7], [], [9]. This tendency, however, became less pronounced as time passes. Instead, researchers start to take a close interest in the characteristics of IPv traffic based on real-world traces [0], [7]. In this section, we choose a small number of publications which also studied IPv and briefly discribe their work. Raicu et al. [5] evaluated and compared the performance of the two different IPv-to-IPv transition mechanisms, i. e., host-to-host encapsulation mechanism (-over-) and routerto-router tunneling mechanism (in), in terms of TCP latency, throughput, and CPU utilization. Malone et al. [7] quantified the number of IPv addresses accessable in the Internet based on traffic data collected within specific websites and DNS servers. They used prefixes of identified IPv addresses in order to classify IPv-to-IPv transition techniques. During their measurement (mid. 00), the authors observed the remarkable increase of teredo prefixes, but still the least used compared to other transition mechanisms, within their data sets. Karpilovsky et al. [] also measured the number of publicly announced IPv prefixes by analyzing snapshots of BGP data obtained from RouteViews Project. They reported that RIPE, i. e., Regional Internet Registry (RIR) for European countries, is the increasingly dominant registrar for IPv address allocation. Colitti et al. [9] analyzed passively collected data from Google s IPv-enabled web page and evaluated the degree of the IPv adoption. Their evaluation shows that the adoption of IPv is still low but steadily growing and that the vast majority of IPv traffic is contributed by only small number of networks. Gao et al. [0] proposed the method to classify the PP traffic from flow-baed IPv traffic and evaluated the stage of the IPv deployment in China. They found that PP and streaming applications are accounting for the major fraction of IPv traffic in China. Nikkhah et al. [] assessed the performance of IPv and compare it to the performance of IPv. They claimed that the inefficient pathfinding is the major cause of the poor performance that IPv shows. Sarrar et al. [7] observed changes of IPv traffic on World IPv Day by analyzing traffic traces collected from the same monitoring point that our study bases on. They reported the significant increase of IPv traffic (more than twice) on the event day and found that IPv traffic did not decrease even after the end of the event. VII. CONCLUSIONS In this paper, we evaluated the current status of IPv traffic by analyzing the traffic trace collected from a large European IXP during months of the time span including the two global IPv events (World IPv Day and World IPv Launch). Even though we observed that IPv traffic accounts for only small fraction of the total Internet traffic (0.5 % in the peak period within our measurement), our study on IPv traffic showed that the deployment of IPv technology is finally on the right track and we are slowly overcoming the shyness facing the new Internet technology. Our claim is based on three factors we have shown in the paper. First, the sharp rise in the number of IPv prefixes and the IPv traffic has been observed since the World IPv Day and the increase rate does not slow down after the the World IPv Launch event. Second, the application mix of the IPv traffic began to form the current traffic status of the IPv-dominated Internet, e. g., about 50 % of HTTP traffic. Third, the fraction of native IPv traffic overtook that of traffic transferred within IPv-over- IPv technologies. We are of the belief that continuous efforts on the IPv deployment such as World IPv Day and World IPv Launch will keep this increasing tendency. REFERENCES [] Archive: 0 world ipv day. [Online]. Available: internetsociety.org/ipv/archive-0-world-ipv-day [] World ipv launch. [Online]. Available: [3] S. Deering and R. Hinden, Internet Protocol, Version (IPv) Specification, RFC 0 (Draft Standard), Internet Engineering Task Force, Dec. 99, updated by RFCs 5095, 57, 57. [Online]. Available: [] Apnic s ipv pool usage. [Online]. Available: community/ipv-exhaustion/graphical-information [5] The internet society. [Online]. Available: [] B. Ager, N. Chatzis, A. Feldmann, N. Sarrar, S. Uhlig, and W. Willinger, Anatomy of a large european ixp, in Proceedings of the ACM SIGCOMM 0, Aug. 0. [Online]. Available:
9 [7] N. Sarrar, G. Maier, B. Ager, R. Sommer, and S. Uhlig, Investigating ipv traffic: what happened at the world ipv day? in Proceedings of the 3th international conference on Passive and Active Measurement, ser. PAM. Berlin, Heidelberg: Springer-Verlag, 0, pp. 0. [] E. Nordmark and R. Gilligan, Basic Transition Mechanisms for IPv Hosts and Routers, RFC 3 (Proposed Standard), Internet Engineering Task Force, Oct [Online]. Available: [9] C. Huitema, Teredo: Tunneling IPv over UDP through Network Address Translations (NATs), RFC 30 (Proposed Standard), Internet Engineering Task Force, Feb. 00, updated by RFCs 599, 0. [Online]. Available: [] J. Massar, AYIYA: Anything In Anything, Internet Engineering Task Force, Jan [Online]. Available: draft-massar-vops-ayiya-0 [] Routeviews project. [Online]. Available: [] J. Kim, F. Schneider, B. Ager, and A. Feldmann, Today s usenet usage: Characterizing nntp traffic, in Proceedings of INFOCOM IEEE Conference on Computer Communications Workshops. New York, NY, USA: IEEE, March 0, p.. [3] Google ipv statistics. [Online]. Available: ipv/statistics.html [] Global ipv deployment progress report. [Online]. Available: http: //bgp.he.net/ipv-progress-report.cgi [5] I. Raicu and S. Zeadally, Evaluating ipv to ipv transition mechanisms, in Proceedings of the th International Conference on Telecommunications, vol., Feb. 003, pp. 9 9 vol.. [] M. Nikkhah, R. Guérin, Y. Lee, and R. Woundy, Assessing ipv through web access a measurement study and its findings, in Proceedings of the 7th COnference on emerging Networking EXperiments and Technologies, ser. CoNEXT. New York, NY, USA: ACM, 0, pp. : :. [Online]. Available: http: //doi.acm.org/.5/ [7] D. Malone, Observations of ipv addresses, in Proceedings of the 9th international conference on Passive and active network measurement, ser. PAM 0. Berlin, Heidelberg: Springer-Verlag, 00, pp. 30. [Online]. Available: [] E. Karpilovsky, A. Gerber, D. Pei, J. Rexford, and A. Shaikh, Quantifying the extent of ipv deployment, in Proceedings of the th international conference on Passive and Active Measurement, ser. PAM 09. Berlin, Heidelberg: Springer-Verlag, 009, pp. 3. [Online]. Available: [9] L. Colitti, S. Gunderson, E. Kline, and T. Refice, Evaluating ipv adoption in the internet, in Proceedings of the th international conference on Passive and Active Measurement, ser. PAM. Berlin, Heidelberg: Springer-Verlag, 0, pp. 50. [Online]. Available: [0] L. Gao, J. Yang, H. Zhang, D. Qin, and B. Zhang, What s going on in chinese ipv world, in Network Operations and Management Symposium (NOMS), 0 IEEE, Apr. 0, pp
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,
IPv4 Address Allocation and the BGP Routing Table Evolution
IPv Address Allocation and the BGP Routing Table Evolution Xiaoqiao Meng, Zhiguo Xu, Beichuan Zhang, Geoff Huston, Songwu Lu, Lixia Zhang Computer Science Dept., UCLA APNIC Los Angeles, CA 99 Brisbane,
IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas
IPv6 Fundamentals Chapter 1: Introduction ti to IPv6 Copyright Cisco Academy Yannis Xydas The Network Today The Internet of today is much different that it was 30, 15 or 5 years ago. 2 Technology Tomorrow
Network Level Multihoming and BGP Challenges
Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology [email protected] Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 01003
On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 0003 Abstract The sizes of the BGP routing tables have increased by an order of magnitude
Deploying IPv6 Service Across Local IPv4 Access Networks
Deploying IPv6 Service Across Local IPv4 Access Networks ALA HAMARSHEH 1, MARNIX GOOSSENS 1, RAFE ALASEM 2 1 Vrije Universiteit Brussel Department of Electronics and Informatics ETRO Building K, Office
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.
Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.20 Long term and short term solutions to Internet scalability
Dynamics of Prefix Usage at an Edge Router
Dynamics of Prefix Usage at an Edge Router Kaustubh Gadkari, Daniel Massey, and Christos Papadopoulos Computer Science Department, Colorado State University, USA {kaustubh, massey, [email protected]}
Trends in Internet Traffic Patterns Darren Anstee, EMEA Solutions Architect
Trends in Internet Traffic Patterns Darren Anstee, EMEA Solutions Architect This Talk The End of the Internet as we Know it We present the largest study of Internet traffic every conducted Peer-reviewed
A First Look at Inter-Data Center Traffic Characteristics via Yahoo! Datasets
A First Look at Inter-Data Center Traffic Characteristics via Yahoo! Datasets Yingying Chen, Sourabh Jain,VijayKumarAdhikari, Zhi-Li Zhang,andKuaiXu 2 University of Minnesota-Twin Cities 2 Arizona State
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
A First Look at Inter-Data Center Traffic Characteristics via Yahoo! Datasets
A First Look at Inter-Data Center Traffic Characteristics via Yahoo! Datasets Yingying Chen, Sourabh Jain, Vijay Kumar Adhikari, Zhi-Li Zhang, and Kuai Xu 2 University of Minnesota-Twin Cities 2 Arizona
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project Advisor: Sharon Goldberg Adam Udi 1 Introduction Interdomain routing, the primary method of communication on the internet,
Internet Traffic and Content Consolidation
Internet Traffic and Content Consolidation Craig Labovitz Chief Scientist, Arbor Networks S. Iekel-Johnson, D. McPherson Arbor Networks, Inc. J. Oberheide, F. Jahanian University of Michigan Talk Outline
How Network Operators Do Prepare for the Rise of the Machines
Internet of Things and the Impact on Transport Networks How Network Operators Do Prepare for the Rise of the Machines Telecommunication networks today were never designed having Inter of Things use cases
IPv6 Tunneling Over IPV4
www.ijcsi.org 599 IPv6 Tunneling Over IPV4 A.Sankara Narayanan 1, M.Syed Khaja Mohideen 2, M.Chithik Raja 3 Department of Information Technology Salalah College of Technology Sultanate of Oman ABSTRACT
Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.
TLP:WHITE - Port Evolution Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. Gerard Wagener 41, avenue de la Gare L-1611 Luxembourg Grand-Duchy
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
Craig Labovitz, Scott Iekel-Johnson, Danny McPherson Arbor Networks Jon Oberheide, Farnam Jahanian University of Michigan
Internet Inter-Domain Traffic Craig Labovitz, Scott Iekel-Johnson, Danny McPherson Arbor Networks Jon Oberheide, Farnam Jahanian University of Michigan Motivation Measuring the Internet is hard Significant
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
Internet Traffic Evolution 2007-2011
Internet Traffic Evolution 2007-2011 Craig Labovitz April 6, 2011 Talk Outline Four-year ongoing inter-domain traffic study Review of 2010 results (NANOG / IETF / SIGCOMM) Methodology Changing carrier
Introduction to The Internet
Introduction to The Internet ISP Workshops Last updated 5 September 2014 1 Introduction to the Internet p Topologies and Definitions p IP Addressing p Internet Hierarchy p Gluing it all together 2 Topologies
NAT and Firewall Traversal with STUN / TURN / ICE
NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:[email protected] http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.
Introduction to The Internet. ISP/IXP Workshops
Introduction to The Internet ISP/IXP Workshops 1 Introduction to the Internet Topologies and Definitions IP Addressing Internet Hierarchy Gluing it all together 2 Topologies and Definitions What does all
Performance Comparison of SCTP and TCP over Linux Platform
Performance Comparison of SCTP and TCP over Linux Platform Jong-Shik Ha, Sang-Tae Kim, and Seok J. Koh Department of Computer Science, Kyungpook National University, Korea {mugal1, saintpaul1978, sjkoh}@cs.knu.ac.kr
CS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on 16 10 2010
IPv4 Addressing There are several non-profit organizations in the world that have the authority for assigning IP addresses to institutions that need access to the Internet. These organizations are (for
IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date
IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4
Towards Modelling The Internet Topology The Interactive Growth Model
Towards Modelling The Internet Topology The Interactive Growth Model Shi Zhou (member of IEEE & IEE) Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS
CSE 123: Computer Networks
CSE 123: Computer Networks Homework 4 Solutions Out: 12/03 Due: 12/10 1. Routers and QoS Packet # Size Flow 1 100 1 2 110 1 3 50 1 4 160 2 5 80 2 6 240 2 7 90 3 8 180 3 Suppose a router has three input
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces Yunfeng Fei, John Jones, Kyriakos Lakkas, Yuhong Zheng Abstract: In recent years many common applications have been modified
Chapter 19 Network Layer: Logical Addressing 19.1
Chapter 19 Network Layer: Logical Addressing 19.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 19-1 IPv4 ADDRESSES An IPv4 address is a 32-bit address that
IPv4 and IPv6: Connecting NAT-PT to Network Address Pool
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5):547-553 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Intercommunication Strategy about IPv4/IPv6 coexistence
modeling Network Traffic
Aalborg Universitet Characterization and Modeling of Network Shawky, Ahmed Sherif Mahmoud; Bergheim, Hans ; Ragnarsson, Olafur ; Wranty, Andrzej ; Pedersen, Jens Myrup Published in: Proceedings of 6th
IP Addressing A Simplified Tutorial
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
Internet Traffic Measurement
Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
Ensuring a Smooth Transition to Internet Protocol Version 6 (IPv6)
WHITE PAPER www.brocade.com APPLICATION DELIVERY Ensuring a Smooth Transition to Internet Protocol Version 6 (IPv6) As IPv4 addresses dwindle, companies face the reality of a dual-protocol world The transition
The Internet. On October 24, 1995, the FNC unanimously passed a resolution defining the term Internet.
The Internet Introductory material. An overview lecture that covers Internet related topics, including a definition of the Internet, an overview of its history and growth, and standardization and naming.
Transition to IPv6 in Service Providers
Transition to IPv6 in Service Providers Jean-Marc Uzé Director Product & Technology, EMEA [email protected] UKNOF14 Workshop Imperial college, London, Sept 11 th, 2009 1 Agenda Planning Transition Transition
The ISP Column A monthly column on all things Internet
The ISP Column A monthly column on all things Internet Just How Good are You? Measuring Network Performance February 2003 Geoff Huston If you are involved in the operation of an IP network, a question
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
The Internet Introductory material.
The Internet Introductory material. An overview lecture that covers Internet related topics, including a definition of the Internet, an overview of its history and growth, and standardization and naming.
Savera Tanwir. Internet Protocol
Savera Tanwir Internet Protocol The IP Protocol The IPv4 (Internet Protocol) header. IP Packet Details Header and payload Header itself has a fixed part and variable part Version IPv4, IPv5 or IPv6 IHL,
Multihoming: An Overview
Multihoming: An Overview & a brief introduction to GSE(8+8) Lixia Zhang IAB BOF on IPv6 Multihoming RIPE 2006 Customer network 1 1.1.16.0/20 Single Home Global Routing Table...... 1.1.0.0/16 2.2.0.0/16.......
Analysis of Internet Topologies: A Historical View
Analysis of Internet Topologies: A Historical View Mohamadreza Najiminaini, Laxmi Subedi, and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/cnl Simon Fraser University Vancouver,
Industry Automation White Paper Januar 2013 IPv6 in automation technology
Table of contents: 1 Why another White Paper IPv6?... 3 2 IPv6 for automation technology... 3 3 Basics of IPv6... 3 3.1 Turning point/initial situation... 3 3.2 Standardization... 4 3.2.1 IPv6 address
Measurement Study on the Internet reachability. 3.1 Introduction. 3. Internet Backbone
3. Measurement Study on the Internet reachability Internet reachability can be assessed using control-plane and data-plane measurements. However, there are biases in the results of these two measurement
Internet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
NAT and Firewall Traversal with STUN / TURN / ICE
NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:[email protected] http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.
IPv6 The Big Picture. Rob Evans, Janet [email protected]
IPv6 The Big Picture Rob Evans, Janet [email protected] Where are we? IPv4 32 bit addresses 4,294,967,296 possible addresses In practice much less than this. History of large allocations /8s Inefficiency
DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses.
Lab Exercise DNS Objective DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses. Step 1: Analyse the supplied DNS Trace Here we examine the supplied trace of a
Analysis of Internet Topologies
Analysis of Internet Topologies Ljiljana Trajković [email protected] Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab
ACL Based Dynamic Network Reachability in Cross Domain
South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer
Examining Proxies to Mitigate Pervasive Surveillance
Examining Proxies to Mitigate Pervasive Surveillance Eliot Lear Barbara Fraser Abstract The notion of pervasive surveillance assumes that it is possible for an attacker to have access to all links and
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
What is AfriNIC, IPv4 exhaustion & IPv6 transition
AfriNIC 2005-2008 What is AfriNIC, IPv4 exhaustion & IPv6 transition The RIR System What is AfriNIC Adiel A. Akplogan CEO, AfriNIC cctld Forum, Paille (MU) March2009 Internet resources Number resources?
Where Do You Tube? Uncovering YouTube Server Selection Strategy
Where Do You Tube? Uncovering YouTube Server Selection Strategy Vijay Kumar Adhikari, Sourabh Jain, Zhi-Li Zhang University of Minnesota- Twin Cities Abstract YouTube is one of the most popular video sharing
technical Operations Area IP Resource Management
IP Resource Management technical The IP Resource management is one of the critical areas of AfriNIC's activities. 27 has shown a great growth in its activity through new members and Resources Allocation/Assignment.
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
Internet Peering, IPv6, and NATs. Mike Freedman V22.0480-005 Networks
Internet Peering, IPv6, and NATs Mike Freedman V22.0480-005 Networks Internet Peering Review: Routing Internet has a loose hierarchy of domains Hosts now local router Local routers know site routers Site
Transition to IPv6 for Managed Service Providers: Meet Customer Requirements for IP Addressing
White Paper Transition to IPv6 for Managed Service Providers: Meet Customer Requirements for IP Addressing What You Will Learn With the exhaustion of IPv4 addresses, businesses and government agencies
BITAG Publishes Report: Differentiated Treatment of Internet Traffic
1550 Larimer Street, Suite 168 Denver, CO. 80202 BITAG Publishes Report: Differentiated Treatment of Internet Traffic Denver, CO (October 8, 2015): Today, the Broadband Internet Technical Advisory Group
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
REDUCING PACKET OVERHEAD IN MOBILE IPV6
REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran [email protected] [email protected] Common Mobile
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Planning the transition to IPv6
Planning the transition to IPv6 An Allstream White Paper 1 Table of contents Why transition now? 1 Transition mechanisms 2 Transition phases 2 IPv6 transition challenges 3 Taking advantage of IPv6 benefits
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
Impact of IPv4 Address Allocation Practice on BGP Routing Table Growth
1 Impact of IPv4 Address Allocation Practice on BGP Routing Table Growth Zhiguo Xu, Xiaoqiao Meng, Lixia Zhang, Songwu Lu Department of Computer Science University of California, Los Angeles Los Angeles,
Real World IPv6 Migration Solutions. Asoka De Saram Sr. Director of Systems Engineering, A10 Networks
Real World IPv6 Migration Solutions Asoka De Saram Sr. Director of Systems Engineering, A10 Networks 1 Agenda Choosing the right solutions Design considerations IPv4 to IPv6 migration road map Consumer
WHITE PAPER. Understanding IP Addressing: Everything You Ever Wanted To Know
WHITE PAPER Understanding IP Addressing: Everything You Ever Wanted To Know Understanding IP Addressing: Everything You Ever Wanted To Know CONTENTS Internet Scaling Problems 1 Classful IP Addressing 3
Internet Traffic Trends A View from 67 ISPs
Internet Traffic Trends A View from 67 ISPs Craig Labovitz ([email protected]) Danny McPherson ([email protected]) Scott Iekel-Johnson ([email protected]) Mike Hollyman ([email protected]) Internet Statistics
Acquia Cloud Edge Protect Powered by CloudFlare
Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....
The forces behind the changing Internet: IXPs, content delivery, and virtualization
The forces behind the changing Internet: IXPs, content delivery, and virtualization Prof. Steve Uhlig Head of Networks research group Queen Mary, University of London [email protected] http://www.eecs.qmul.ac.uk/~steve/
On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu
On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu Dilip Kumar Krishnappa, Samamon Khemmarat, Lixin Gao, Michael Zink University of Massachusetts Amherst,
WHITE PAPER. Best Practices for Deploying IPv6 over Broadband Access
WHITE PAPER Best Practices for Deploying IPv6 over Broadband Access www.ixiacom.com 915-0123-01 Rev. C, December 2013 2 Table of Contents Udi cusciamenis minctorpos... 4 Toreptur aut dolo cone verum aute
Chapter 12 Supporting Network Address Translation (NAT)
[Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information
BGP. 1. Internet Routing
BGP 1. Internet Routing (C) Herbert Haas 2005/03/11 1 Internet Routing Interior Gateway Protocols (IGPs) not suitable for Inter-ISP routing Technical metrics only No policy features Inter-ISP routing is
