首页 > 最新文献

CoNEXT '10 Student Workshop最新文献

英文 中文
Understanding the impact of internet exchange points on internet topology and routing performance 了解互联网交换点对互联网拓扑和路由性能的影响
Pub Date : 2010-11-30 DOI: 10.1145/1921206.1921226
M. Ahmad, R. Guha
The growth of Internet eXchange Points (IXPs) as an important component in the Internet Autonomous System (AS) level topology has led to the need for a detailed evaluation of their effect on Internet topology evolution and inter-domain packet routing. In this work, we carry out initial measurements to analyze the effect of the additional peering links and observe path quality in terms of round-trip time and loss rates of routes going through an IXP between pairs of Internet hosts. We observe significant effects of IXP-links on Internet growth and topology evolution while the routing performance points to numerous cases of Triangle Inequality Violations (TIVs) due to the IXP switches.
随着互联网交换点(ixp)作为互联网自治系统(as)级拓扑结构的重要组成部分的发展,有必要详细评估其对互联网拓扑演变和域间分组路由的影响。在这项工作中,我们进行了初步测量,以分析额外对等链路的影响,并根据往返时间和路由损失率观察路径质量,这些路径经过互联网主机对之间的IXP。我们观察到IXP链路对互联网增长和拓扑演变的显著影响,而路由性能指向许多由于IXP交换机导致的三角不等式违反(tiv)的情况。
{"title":"Understanding the impact of internet exchange points on internet topology and routing performance","authors":"M. Ahmad, R. Guha","doi":"10.1145/1921206.1921226","DOIUrl":"https://doi.org/10.1145/1921206.1921226","url":null,"abstract":"The growth of Internet eXchange Points (IXPs) as an important component in the Internet Autonomous System (AS) level topology has led to the need for a detailed evaluation of their effect on Internet topology evolution and inter-domain packet routing. In this work, we carry out initial measurements to analyze the effect of the additional peering links and observe path quality in terms of round-trip time and loss rates of routes going through an IXP between pairs of Internet hosts. We observe significant effects of IXP-links on Internet growth and topology evolution while the routing performance points to numerous cases of Triangle Inequality Violations (TIVs) due to the IXP switches.","PeriodicalId":325024,"journal":{"name":"CoNEXT '10 Student Workshop","volume":"384 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126729809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Robust traffic anomaly detection with principal component pursuit 基于主成分追踪的鲁棒交通异常检测
Pub Date : 2010-11-30 DOI: 10.1145/1921206.1921217
A. Abdelkefi, Yuming Jiang, Wen Wang, Arne Øslebø, O. Kvittem
Principal component analysis (PCA) is a statistical technique that has been used for data analysis and dimensionality reduction. It was introduced as a network traffic anomaly detection technique firstly in [1]. Since then, a lot of research attention has been received, which results in an extensive analysis and several extensions. In [2], the sensitivity of PCA to its tuning parameters, such as the dimension of the low-rank subspace and the detection threshold, on traffic anomaly detection was indicated. However, no explanation on the underlying reasons of the problem was given in [2]. In [3], further investigation on the PCA sensitivity was conducted and it was found that the PCA sensitivity comes from the inability of PCA to detect temporal correlations. Based on this finding, an extension of PCA to Kalman-Loeve expansion (KLE) was proposed in [3]. While KLE shows slight improvement, it still exhibits similar sensitivity issue since a new tuning parameter called temporal correlation range was introduced. Recently, in [4], additional effort was paid to illustrate the PCA-poisoning problem. To underline this problem, an evading strategy called Boiled-Frog was proposed which adds a high fraction of outliers to the traffic. To defend against this, the authors employed a more robust version of PCA called PCA-GRID. While PCA-GRID shows performance improvement regarding the robustness to the outliers, it experiences a high sensitivity to the threshold estimate and the k-dimensional subspace that maximizes the dispersion of the data. The purpose of this work is to consider another technique to address the PCA poisoning problems to provide robust traffic anomaly detection: The Principal Component Pursuit.
主成分分析(PCA)是一种用于数据分析和降维的统计技术。它作为一种网络流量异常检测技术在文献[1]中首次提出。从那时起,大量的研究得到了关注,这导致了广泛的分析和一些扩展。文献[2]表明了主成分分析对其调优参数(如低秩子空间维数和检测阈值)在交通异常检测中的敏感性。然而,文献[2]并没有对问题的根本原因做出解释。[3]对PCA的敏感性进行了进一步的研究,发现PCA的敏感性来自于PCA无法检测时间相关性。基于这一发现,[3]提出了将PCA扩展为Kalman-Loeve展开式(KLE)。虽然KLE略有改善,但由于引入了新的调优参数时间相关范围,仍然存在类似的灵敏度问题。最近,在[4]中,进一步努力说明了pca中毒问题。为了突出这一问题,提出了一种名为“沸腾青蛙”的规避策略,该策略在流量中添加了大量异常值。为了防止这种情况,作者采用了一种更健壮的PCA版本,称为PCA- grid。虽然PCA-GRID在对异常值的鲁棒性方面表现出性能改进,但它对阈值估计和k维子空间的灵敏度很高,从而最大化了数据的离散性。这项工作的目的是考虑另一种技术来解决PCA中毒问题,以提供鲁棒的流量异常检测:主成分追踪。
{"title":"Robust traffic anomaly detection with principal component pursuit","authors":"A. Abdelkefi, Yuming Jiang, Wen Wang, Arne Øslebø, O. Kvittem","doi":"10.1145/1921206.1921217","DOIUrl":"https://doi.org/10.1145/1921206.1921217","url":null,"abstract":"Principal component analysis (PCA) is a statistical technique that has been used for data analysis and dimensionality reduction. It was introduced as a network traffic anomaly detection technique firstly in [1]. Since then, a lot of research attention has been received, which results in an extensive analysis and several extensions. In [2], the sensitivity of PCA to its tuning parameters, such as the dimension of the low-rank subspace and the detection threshold, on traffic anomaly detection was indicated. However, no explanation on the underlying reasons of the problem was given in [2]. In [3], further investigation on the PCA sensitivity was conducted and it was found that the PCA sensitivity comes from the inability of PCA to detect temporal correlations. Based on this finding, an extension of PCA to Kalman-Loeve expansion (KLE) was proposed in [3]. While KLE shows slight improvement, it still exhibits similar sensitivity issue since a new tuning parameter called temporal correlation range was introduced. Recently, in [4], additional effort was paid to illustrate the PCA-poisoning problem. To underline this problem, an evading strategy called Boiled-Frog was proposed which adds a high fraction of outliers to the traffic. To defend against this, the authors employed a more robust version of PCA called PCA-GRID. While PCA-GRID shows performance improvement regarding the robustness to the outliers, it experiences a high sensitivity to the threshold estimate and the k-dimensional subspace that maximizes the dispersion of the data. The purpose of this work is to consider another technique to address the PCA poisoning problems to provide robust traffic anomaly detection: The Principal Component Pursuit.","PeriodicalId":325024,"journal":{"name":"CoNEXT '10 Student Workshop","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124130275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Have your cake and eat it too!: enabling frequency diversity through opportunism 鱼与熊掌兼得!:通过机会主义实现频率分集
Pub Date : 2010-11-30 DOI: 10.1145/1921206.1921224
Edmund L. Wong, Sangmin Lee
The broadcast nature of wireless networks is both a boon and a bane. On the one hand, multiple receivers may overhear a single transmission on the same channel at no additional cost above a point-to-point transmission; this property has been exploited in many opportunistic applications (e.g., [2]). On the other hand, the shared nature of the medium effectively forces wireless nodes to leverage frequency diversity and channelization for efficiency. Unfortunately, coordinating communication between nodes that may switch channels at any time is difficult and may in fact offset any performance gains from leveraging frequency diversity.
无线网络的广播特性既是福音也是祸根。一方面,多个接收器可以在点对点传输之上不增加费用的情况下偷听同一信道上的单个传输;这一特性已在许多机会性应用中被利用(例如,[2])。另一方面,媒介的共享特性有效地迫使无线节点利用频率分集和信道化来提高效率。不幸的是,在可能随时切换信道的节点之间协调通信是困难的,并且实际上可能抵消利用频率分集所带来的任何性能增益。
{"title":"Have your cake and eat it too!: enabling frequency diversity through opportunism","authors":"Edmund L. Wong, Sangmin Lee","doi":"10.1145/1921206.1921224","DOIUrl":"https://doi.org/10.1145/1921206.1921224","url":null,"abstract":"The broadcast nature of wireless networks is both a boon and a bane. On the one hand, multiple receivers may overhear a single transmission on the same channel at no additional cost above a point-to-point transmission; this property has been exploited in many opportunistic applications (e.g., [2]). On the other hand, the shared nature of the medium effectively forces wireless nodes to leverage frequency diversity and channelization for efficiency. Unfortunately, coordinating communication between nodes that may switch channels at any time is difficult and may in fact offset any performance gains from leveraging frequency diversity.","PeriodicalId":325024,"journal":{"name":"CoNEXT '10 Student Workshop","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124252898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards hardware accelerated software routers 走向硬件加速软件路由器
Pub Date : 2010-11-30 DOI: 10.1145/1921206.1921209
Nadi Sarrar, A. Feldmann, S. Uhlig, Rob Sherwood, Xin Huang
We propose an alternative router design to fill the gap between PC-based open source software routers and commercial high-end routers. Our hardware accelerated software router uses commodity PC hardware running an open source software router for the control path, and couples it with programmable switching hardware by delegating most of the packet forwarding to the switch. We describe a prototype implementation and show that it is capable of handling the traffic requirements of an existing carrier aggregation network.
我们提出了一种替代路由器设计,以填补基于pc的开源软件路由器和商用高端路由器之间的空白。我们的硬件加速软件路由器使用运行开源软件路由器的商用PC硬件作为控制路径,并通过将大部分数据包转发委托给交换机,将其与可编程交换硬件相结合。我们描述了一个原型实现,并表明它能够处理现有载波聚合网络的流量需求。
{"title":"Towards hardware accelerated software routers","authors":"Nadi Sarrar, A. Feldmann, S. Uhlig, Rob Sherwood, Xin Huang","doi":"10.1145/1921206.1921209","DOIUrl":"https://doi.org/10.1145/1921206.1921209","url":null,"abstract":"We propose an alternative router design to fill the gap between PC-based open source software routers and commercial high-end routers. Our hardware accelerated software router uses commodity PC hardware running an open source software router for the control path, and couples it with programmable switching hardware by delegating most of the packet forwarding to the switch. We describe a prototype implementation and show that it is capable of handling the traffic requirements of an existing carrier aggregation network.","PeriodicalId":325024,"journal":{"name":"CoNEXT '10 Student Workshop","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121720155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Prefetching Bloom filters to control flooding in content-centric networks 预取Bloom过滤器以控制以内容为中心的网络中的泛滥
Pub Date : 2010-11-30 DOI: 10.1145/1921206.1921230
A. W. Kazi
We address an issue relevant to Content-Centric Networks, in which content is discovered by flooding a request over the entire network. In our design, the collection of objects resolvable by a router is represented using Bloom filters. In response to the flooding, we send Bloom filters -- in essence transmitting all the object names represented within a router -- along with the object. In this manner, any subsequent request to an object represented within that Bloom filter will not need to be flooded. We present preliminary observations to validate our claims.
我们解决了一个与以内容为中心的网络相关的问题,其中内容是通过在整个网络上淹没请求来发现的。在我们的设计中,路由器可解析的对象集合使用Bloom过滤器表示。为了响应泛洪,我们发送Bloom过滤器——本质上是发送路由器中表示的所有对象名称——以及对象。通过这种方式,对该Bloom过滤器中表示的对象的任何后续请求都不需要被淹没。我们提出初步观察来证实我们的主张。
{"title":"Prefetching Bloom filters to control flooding in content-centric networks","authors":"A. W. Kazi","doi":"10.1145/1921206.1921230","DOIUrl":"https://doi.org/10.1145/1921206.1921230","url":null,"abstract":"We address an issue relevant to Content-Centric Networks, in which content is discovered by flooding a request over the entire network. In our design, the collection of objects resolvable by a router is represented using Bloom filters. In response to the flooding, we send Bloom filters -- in essence transmitting all the object names represented within a router -- along with the object. In this manner, any subsequent request to an object represented within that Bloom filter will not need to be flooded. We present preliminary observations to validate our claims.","PeriodicalId":325024,"journal":{"name":"CoNEXT '10 Student Workshop","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121569129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
NetQuery: a knowledge plane for reasoning about network properties NetQuery:用于网络属性推理的知识平面
Pub Date : 2010-11-30 DOI: 10.1145/1921206.1921231
Alan Shieh, E. G. Sirer, F. Schneider
Depending on their configuration, administration, and provisioning, networks provide drastically different features. For instance, some networks provide little failure resilience while others provision failover capacity and deploy middleboxes to protect against denial of service attacks [1, 2]. Yet the standard IP interface masks these differences; every network appears to provide the same basic "dial-tone" service. Consequently, clients that desire certain network properties must resort to ad hoc techniques to detect these differences or must target the lowest common denominator service.
根据配置、管理和供应的不同,网络提供了截然不同的特性。例如,一些网络提供很少的故障恢复能力,而另一些网络提供故障转移能力并部署中间件来防止拒绝服务攻击[1,2]。然而,标准IP接口掩盖了这些差异;每个网络似乎都提供相同的基本“拨号音”服务。因此,需要某些网络属性的客户端必须求助于特殊技术来检测这些差异,或者必须以最小公分母的服务为目标。
{"title":"NetQuery: a knowledge plane for reasoning about network properties","authors":"Alan Shieh, E. G. Sirer, F. Schneider","doi":"10.1145/1921206.1921231","DOIUrl":"https://doi.org/10.1145/1921206.1921231","url":null,"abstract":"Depending on their configuration, administration, and provisioning, networks provide drastically different features. For instance, some networks provide little failure resilience while others provision failover capacity and deploy middleboxes to protect against denial of service attacks [1, 2]. Yet the standard IP interface masks these differences; every network appears to provide the same basic \"dial-tone\" service. Consequently, clients that desire certain network properties must resort to ad hoc techniques to detect these differences or must target the lowest common denominator service.","PeriodicalId":325024,"journal":{"name":"CoNEXT '10 Student Workshop","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114567070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Multipath transport protocol for heterogeneous multi-homing networks 异构多归属网络的多路径传输协议
Pub Date : 2010-11-30 DOI: 10.1145/1921206.1921212
YoungHa Hwang, B. O. Obele, Hyuk Lim
We present a new multipath transport protocol - Heterogeneous Multipath Transport Protocol (HMTP), powered by fountain codes to improve throughput performance and path utilization of heterogeneous multi-homing networks. HMTP solves the receive buffer blocking problem and eliminates the need for retransmission and in-order packet delivery, especially in a heterogeneous multi-homing network.
本文提出了一种新的多路径传输协议——异构多路径传输协议(htp),该协议由喷泉码驱动,以提高异构多宿主网络的吞吐量性能和路径利用率。htp解决了接收缓冲区阻塞问题,消除了重传和按顺序发送数据包的需要,特别是在异构多宿主网络中。
{"title":"Multipath transport protocol for heterogeneous multi-homing networks","authors":"YoungHa Hwang, B. O. Obele, Hyuk Lim","doi":"10.1145/1921206.1921212","DOIUrl":"https://doi.org/10.1145/1921206.1921212","url":null,"abstract":"We present a new multipath transport protocol - Heterogeneous Multipath Transport Protocol (HMTP), powered by fountain codes to improve throughput performance and path utilization of heterogeneous multi-homing networks. HMTP solves the receive buffer blocking problem and eliminates the need for retransmission and in-order packet delivery, especially in a heterogeneous multi-homing network.","PeriodicalId":325024,"journal":{"name":"CoNEXT '10 Student Workshop","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125229914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Inferring router statistics with IP timestamps 用IP时间戳推断路由器统计信息
Pub Date : 2010-11-30 DOI: 10.1145/1921206.1921218
Andrew D. Ferguson, Rodrigo Fonseca
This paper describes our initial experiences with using the IP timestamp option to infer router statistics such as traffic shape and CPU load. By deducing this information through the use of an IP option, we can gather these statistics without administrative access to the router under study. This creates the potential for researchers to gather basic statistics from routers in wide-area networks which support this option.
本文描述了我们使用IP时间戳选项来推断路由器统计信息(如流量形状和CPU负载)的初步经验。通过使用IP选项推断这些信息,我们可以在没有管理访问所研究的路由器的情况下收集这些统计数据。这为研究人员从支持该选项的广域网中的路由器收集基本统计数据创造了潜力。
{"title":"Inferring router statistics with IP timestamps","authors":"Andrew D. Ferguson, Rodrigo Fonseca","doi":"10.1145/1921206.1921218","DOIUrl":"https://doi.org/10.1145/1921206.1921218","url":null,"abstract":"This paper describes our initial experiences with using the IP timestamp option to infer router statistics such as traffic shape and CPU load. By deducing this information through the use of an IP option, we can gather these statistics without administrative access to the router under study. This creates the potential for researchers to gather basic statistics from routers in wide-area networks which support this option.","PeriodicalId":325024,"journal":{"name":"CoNEXT '10 Student Workshop","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121639294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards characterization of wireless traffic in coexisting 802.11a/g and 802.11n network 802.11a/g和802.11n共存网络中无线业务特性研究
Pub Date : 2010-11-30 DOI: 10.1145/1921206.1921208
H. Asai, K. Fukuda, H. Esaki
The number of wireless devices and the traffic volume generated by these devices become significant today, and many devices begin supporting 802.11n protocol for higher-speed wireless access. However, the diversification in link types of end-hosts may degrade system performance. For example, hosts using 802.11 protocols had better not be relay nodes in a P2P live streaming system because 802.11 is a half-duplex protocol and usually less stable compared to modern wired links. Hence, understanding traffic characteristics of various link types is essential for improving or building network architectures. Moreover, estimation of the link type of a remote host possibly achieves better performance (e.g., higher throughput) in some network systems. Baiamonte et al. [1] have proposed an algorithm to detect wireless hosts from passive measurement by using the entropy of packet interarrival time (PIT). Wei et al. [2] have also proposed an algorithm to classify access network types. However, these algorithms pay no attention to new link types such as 802.11n, 3G, and WiMAX even though each of them has different characteristics and possibly degrades the performance of network systems.
如今,无线设备的数量和这些设备产生的通信量变得非常大,许多设备开始支持802.11n协议以实现更快的无线访问。但是,终端主机链路类型的多样化可能会降低系统性能。例如,使用802.11协议的主机最好不要成为P2P直播系统中的中继节点,因为802.11是一种半双工协议,与现代有线链路相比通常不太稳定。因此,了解各种链路类型的流量特征对于改进或构建网络架构至关重要。此外,在某些网络系统中,对远程主机的链路类型的估计可能实现更好的性能(例如,更高的吞吐量)。Baiamonte等人[1]提出了一种利用包间到达时间(packet interarrival time, PIT)熵从被动测量中检测无线主机的算法。Wei等人[2]也提出了一种接入网类型分类算法。然而,这些算法不考虑新的链路类型,如802.11n、3G和WiMAX,尽管它们具有不同的特征,可能会降低网络系统的性能。
{"title":"Towards characterization of wireless traffic in coexisting 802.11a/g and 802.11n network","authors":"H. Asai, K. Fukuda, H. Esaki","doi":"10.1145/1921206.1921208","DOIUrl":"https://doi.org/10.1145/1921206.1921208","url":null,"abstract":"The number of wireless devices and the traffic volume generated by these devices become significant today, and many devices begin supporting 802.11n protocol for higher-speed wireless access. However, the diversification in link types of end-hosts may degrade system performance. For example, hosts using 802.11 protocols had better not be relay nodes in a P2P live streaming system because 802.11 is a half-duplex protocol and usually less stable compared to modern wired links. Hence, understanding traffic characteristics of various link types is essential for improving or building network architectures. Moreover, estimation of the link type of a remote host possibly achieves better performance (e.g., higher throughput) in some network systems. Baiamonte et al. [1] have proposed an algorithm to detect wireless hosts from passive measurement by using the entropy of packet interarrival time (PIT). Wei et al. [2] have also proposed an algorithm to classify access network types. However, these algorithms pay no attention to new link types such as 802.11n, 3G, and WiMAX even though each of them has different characteristics and possibly degrades the performance of network systems.","PeriodicalId":325024,"journal":{"name":"CoNEXT '10 Student Workshop","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114958386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Characterizing the file hosting service ecosystem 文件托管服务生态系统的特征
Pub Date : 2010-11-30 DOI: 10.1145/1921206.1921210
Aniket Mahanti, Niklas Carlsson, C. Williamson
File Hosting Services (FHS) such as Rapidshare and Mega-upload have recently become popular. The decline of P2P file sharing has prompted various services including FHS to replace it. We propose a comprehensive multi-level characterization of the FHS ecosystem. We devise a measurement framework to collect datasets from multiple vantage points. To the best of our knowledge, this work is the first to characterize the FHS ecosystem. The work will highlight the content, usage, performance, infrastructure, and quality of service characteristics of FHS. FHS can have significant implications on Internet traffic, if these services were to supplant P2P as the dominant content sharing technology.
文件托管服务(FHS),如Rapidshare和Mega-upload最近变得流行起来。P2P文件共享的衰落促使包括FHS在内的各种服务取而代之。我们建议对FHS生态系统进行全面的多层次表征。我们设计了一个测量框架,从多个有利位置收集数据集。据我们所知,这项工作是第一个描述FHS生态系统的工作。这项工作将突出FHS的内容、使用、性能、基础设施和服务质量特征。如果这些服务要取代P2P成为占主导地位的内容共享技术,FHS将对互联网流量产生重大影响。
{"title":"Characterizing the file hosting service ecosystem","authors":"Aniket Mahanti, Niklas Carlsson, C. Williamson","doi":"10.1145/1921206.1921210","DOIUrl":"https://doi.org/10.1145/1921206.1921210","url":null,"abstract":"File Hosting Services (FHS) such as Rapidshare and Mega-upload have recently become popular. The decline of P2P file sharing has prompted various services including FHS to replace it. We propose a comprehensive multi-level characterization of the FHS ecosystem. We devise a measurement framework to collect datasets from multiple vantage points. To the best of our knowledge, this work is the first to characterize the FHS ecosystem. The work will highlight the content, usage, performance, infrastructure, and quality of service characteristics of FHS. FHS can have significant implications on Internet traffic, if these services were to supplant P2P as the dominant content sharing technology.","PeriodicalId":325024,"journal":{"name":"CoNEXT '10 Student Workshop","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127379770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
CoNEXT '10 Student Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1