The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present an Internet-scale network topology information (NTI) service named WIND for localizing P2P traffic. Central to WIND are the two simple ideas: 1) obtaining NTI directly from routing infrastructures, and 2) leveraging existing, widely deployed DNS caches for NTI delivery. WIND fulfills the fidelity, flexibility and scalability requirement of an effective NTI service. WIND is deployed in CERNET...
Our understanding of IPv6 usage is quite limited. In this paper, we carry out a detailed analysis of Netflow records collected from a China Tier-1 ISP. Many aspects related to traffic attributes and deployment issues are investigated: application types, transitional technologies, interface identifier assignment schemes, etc. Dominating of video streaming and P2P traffic as well as the widely use of...
Broadcatching is a promising mechanism to improve the experience of BitTorrent users by automatically downloading files advertised through RSS feeds. However, though widely used, the mechanism itself has not been well studied. In this paper, we conducted extensive experiments on PlanetLab to evaluate the performance of Broadcatching under different typical scenarios. The results demonstrated the effectiveness...
The structured P2P overlay networks with the constant degree have the efficient data location mechanism. They reduce the maintenance cost caused by nodes joining/leaving the overlay network and make the items in routing table as less as possible. An enhanced structure based on the cycloid system is proposed in this paper. It combines cycloid and folded hypercube and employs the concept of complementary...
Denial-of-Service (DoS) attacks play a significant role among all the network security issues today. In this paper, we present a mechanism (called Swing) to limit the effectiveness of DoS attacks. Inspired by the address-switch conception of the newly proposed shim6 protocol, Swing tries to protect servers from attacks by using a new strategy. In the mechanism, when a DoS attack is detected, the server...
As the substrate of structured peer-to-peer systems, distributed hash table (DHT) plays a key role in P2P routing infrastructures. Traditional DHT does not consider the location of the nodes for the assignment of identifiers, which will result in high end-to-end latency on DHT-based overlay networks. In this paper, we propose a design of locality-aware DHT called LDHT, which exploits network locality...
Identification of P2P traffic is very useful for many network management tasks such as application-specific traffic engineering, network planning and monitoring. However, this is a challenging issue because many P2P applications use dynamic port numbers, and deriving signatures that can be used for reliable detection manually is time consuming and difficult. In this paper, we propose a novel approach...
Coordinates-based distance prediction algorithms can improve the performance of many Internet applications, especially in the peer-to-peer architecture and overlay construction. But some recent researches indicate that the performance gain via distance prediction based on coordinates, rather disappointed, can be significantly worse than the improvement obtained by direct measurement algorithm, and...
The use of peer-to-peer (P2P) applications is growing dramatically, which results in several serious problems such as the network congestion and traffic hindrance. In this paper, a method is proposed to identify the P2P traffic based on the machine learning. The novelty of the proposed method is that it utilizes only the size of packets exchanged between IPs within seconds. By investigating the ratio...
In this paper, we propose Rainbow, a mesh based locality-aware P2P overlay multicast system. Nodes first self-organize into a two-layer overlay. A simple and accurate network coordinate system is used for more reliable node clustering. Pull-based method is used in data packet delivery. According to our simulation, the ARDP of Rainbow ranges from 63% to 76% of that in Binning overlay. Our real-world...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.