Application-Layer Traffic Optimization (ALTO) is an IETF standardized protocol that provides abstract network topology and cost maps in addition to endpoint information services that can be consumed by applications in order to become network-aware and take optimized decisions regarding traffic flows. In this work, we propose a public service based on the ALTO specification using public routing information available at the Brazilian Internet eXchange Points (IXPs). Our ALTO server prototype takes the acronym of AaaS (ALTO-as-a-Service) and is based on over 2.5GB of real BGP data from the 25 Brazilian IX.br public IXPs. We evaluate our proposal in terms of functional behaviour and performance via proof of concept experiments which point to the potential benefits of applications being able to take smart endpoint selection decisions when consuming the developer-friendly ALTO APIs.
This document discusses internet mapping and visualization. It describes collecting BGP and traceroute data from multiple vantage points to map IP addresses and autonomous systems (AS). This involves extracting prefix-AS mappings from BGP tables and using traceroute to map IP addresses to ASes. Several projects are examined, including Routeviews which collects BGP routing data and CAIDA which maps the IPv4 address space. Tools for visualization like Mapnet, Otter, and Walrus are also overviewed. Internet mapping provides insights into the internet infrastructure, routing anomalies, and AS relationships.
Performance Evaluation and Comparisons for IPv4&IPv6 using mpls Technologiesiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Performance Evaluation of Routing Protocols RIPng, OSPFv3, and EIGRP in an
IPv6 Network
Siti Ummi Masruroh
Department of Informatics, FST
UIN Syarif Hidayatullah
Jakarta, Indonesia
ummi.masruroh@uinjkt.ac.id
Fadly Robby
Department of Informatics, FST
UIN Syarif Hidayatullah
Jakarta, Indonesia
fadly.robby11@mhs.uinjkt.ac.id
Nashrul Hakiem
Department of Informatics, FST
UIN Syarif Hidayatullah
Jakarta, Indonesia
hakiem@uinjkt.ac.id
Itcm a real time internet traffic classifier monitorijcsit
The continual growth of high speed networks is a challenge for real-time network analysis systems. The
real time traffic classification is an issue for corporations and ISPs (Internet Service Providers). This work
presents the design and implementation of a real time flow-based network traffic classification system. The
classifier monitor acts as a pipeline consisting of three modules: packet capture and pre-processing, flow
reassembly, and classification with Machine Learning (ML). The modules are built as concurrent processes
with well defined data interfaces between them so that any module can be improved and updated
independently. In this pipeline, the flow reassembly function becomes the bottleneck of the performance. In
this implementation, was used a efficient method of reassembly which results in a average delivery delay of
0.49 seconds, approximately. For the classification module, the performances of the K-Nearest Neighbor
(KNN), C4.5 Decision Tree, Naive Bayes (NB), Flexible Naive Bayes (FNB) and AdaBoost Ensemble
Learning Algorithm are compared in order to validate our approach.
Distributed Algorithm for Frequent Pattern Mining using HadoopMap Reduce Fram...idescitation
With the rapid growth of information technology and in many business
applications, mining frequent patterns and finding associations among them requires
handling large and distributed databases. As FP-tree considered being the best compact data
structure to hold the data patterns in memory there has been efforts to make it parallel and
distributed to handle large databases. However, it incurs lot of communication over head
during the mining. In this paper parallel and distributed frequent pattern mining algorithm
using Hadoop Map Reduce framework is proposed, which shows best performance results
for large databases. Proposed algorithm partitions the database in such a way that, it works
independently at each local node and locally generates the frequent patterns by sharing the
global frequent pattern header table. These local frequent patterns are merged at final stage.
This reduces the complete communication overhead during structure construction as well as
during pattern mining. The item set count is also taken into consideration reducing
processor idle time. Hadoop Map Reduce framework is used effectively in all the steps of the
algorithm. Experiments are carried out on a PC cluster with 5 computing nodes which
shows execution time efficiency as compared to other algorithms. The experimental result
shows that proposed algorithm efficiently handles the scalability for very large datab ases.
Index Terms—
The document evaluates and compares three techniques for migrating from IPv4 to IPv6 using the GNS3 simulator: dual stack, tunneling, and Network Address Translation - Protocol Translation (NAT-PT). It simulates the three migration techniques in GNS3 and analyzes network performance parameters such as latency, packet loss, and response time using Solarwinds. The results found that the tunneling technique had the best performance with the lowest latency and packet loss and fastest response time, making it the best approach for migration based on the simulation.
1) The document compares the performance of IPv4 and IPv6 networks using the OPNET network simulator.
2) It designs IPv4 and IPv6 networks in OPNET and analyzes parameters like delay, throughput, response time and jitter.
3) The simulation results show that IPv6 has higher delays than IPv4 due to its larger header size, but the difference is small. IPv4 also has slightly higher jitter. However, IPv6 performs better under heavy loads and has higher throughput.
Study about Locator/Identifier Separation Protocol (LISP)Assia Bakrim
This document provides an overview of the Locator/Identifier Separation Protocol (LISP). LISP aims to address issues with internet mobility and scalability by separating a device's identifier and locator. It introduces Endpoint Identifiers (EIDs) that serve as a device's identity and Routing Locators (RLOCs) that indicate where the device is attached. The mapping system maps EIDs to RLOCs to allow packets to be routed correctly. LISP has seen growing deployment worldwide and offers advantages like incremental deployment, network virtualization, and reducing the size of global routing tables. However, challenges remain around managing the mapping system and ensuring reachability.
This document discusses internet mapping and visualization. It describes collecting BGP and traceroute data from multiple vantage points to map IP addresses and autonomous systems (AS). This involves extracting prefix-AS mappings from BGP tables and using traceroute to map IP addresses to ASes. Several projects are examined, including Routeviews which collects BGP routing data and CAIDA which maps the IPv4 address space. Tools for visualization like Mapnet, Otter, and Walrus are also overviewed. Internet mapping provides insights into the internet infrastructure, routing anomalies, and AS relationships.
Performance Evaluation and Comparisons for IPv4&IPv6 using mpls Technologiesiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Performance Evaluation of Routing Protocols RIPng, OSPFv3, and EIGRP in an
IPv6 Network
Siti Ummi Masruroh
Department of Informatics, FST
UIN Syarif Hidayatullah
Jakarta, Indonesia
ummi.masruroh@uinjkt.ac.id
Fadly Robby
Department of Informatics, FST
UIN Syarif Hidayatullah
Jakarta, Indonesia
fadly.robby11@mhs.uinjkt.ac.id
Nashrul Hakiem
Department of Informatics, FST
UIN Syarif Hidayatullah
Jakarta, Indonesia
hakiem@uinjkt.ac.id
Itcm a real time internet traffic classifier monitorijcsit
The continual growth of high speed networks is a challenge for real-time network analysis systems. The
real time traffic classification is an issue for corporations and ISPs (Internet Service Providers). This work
presents the design and implementation of a real time flow-based network traffic classification system. The
classifier monitor acts as a pipeline consisting of three modules: packet capture and pre-processing, flow
reassembly, and classification with Machine Learning (ML). The modules are built as concurrent processes
with well defined data interfaces between them so that any module can be improved and updated
independently. In this pipeline, the flow reassembly function becomes the bottleneck of the performance. In
this implementation, was used a efficient method of reassembly which results in a average delivery delay of
0.49 seconds, approximately. For the classification module, the performances of the K-Nearest Neighbor
(KNN), C4.5 Decision Tree, Naive Bayes (NB), Flexible Naive Bayes (FNB) and AdaBoost Ensemble
Learning Algorithm are compared in order to validate our approach.
Distributed Algorithm for Frequent Pattern Mining using HadoopMap Reduce Fram...idescitation
With the rapid growth of information technology and in many business
applications, mining frequent patterns and finding associations among them requires
handling large and distributed databases. As FP-tree considered being the best compact data
structure to hold the data patterns in memory there has been efforts to make it parallel and
distributed to handle large databases. However, it incurs lot of communication over head
during the mining. In this paper parallel and distributed frequent pattern mining algorithm
using Hadoop Map Reduce framework is proposed, which shows best performance results
for large databases. Proposed algorithm partitions the database in such a way that, it works
independently at each local node and locally generates the frequent patterns by sharing the
global frequent pattern header table. These local frequent patterns are merged at final stage.
This reduces the complete communication overhead during structure construction as well as
during pattern mining. The item set count is also taken into consideration reducing
processor idle time. Hadoop Map Reduce framework is used effectively in all the steps of the
algorithm. Experiments are carried out on a PC cluster with 5 computing nodes which
shows execution time efficiency as compared to other algorithms. The experimental result
shows that proposed algorithm efficiently handles the scalability for very large datab ases.
Index Terms—
The document evaluates and compares three techniques for migrating from IPv4 to IPv6 using the GNS3 simulator: dual stack, tunneling, and Network Address Translation - Protocol Translation (NAT-PT). It simulates the three migration techniques in GNS3 and analyzes network performance parameters such as latency, packet loss, and response time using Solarwinds. The results found that the tunneling technique had the best performance with the lowest latency and packet loss and fastest response time, making it the best approach for migration based on the simulation.
1) The document compares the performance of IPv4 and IPv6 networks using the OPNET network simulator.
2) It designs IPv4 and IPv6 networks in OPNET and analyzes parameters like delay, throughput, response time and jitter.
3) The simulation results show that IPv6 has higher delays than IPv4 due to its larger header size, but the difference is small. IPv4 also has slightly higher jitter. However, IPv6 performs better under heavy loads and has higher throughput.
Study about Locator/Identifier Separation Protocol (LISP)Assia Bakrim
This document provides an overview of the Locator/Identifier Separation Protocol (LISP). LISP aims to address issues with internet mobility and scalability by separating a device's identifier and locator. It introduces Endpoint Identifiers (EIDs) that serve as a device's identity and Routing Locators (RLOCs) that indicate where the device is attached. The mapping system maps EIDs to RLOCs to allow packets to be routed correctly. LISP has seen growing deployment worldwide and offers advantages like incremental deployment, network virtualization, and reducing the size of global routing tables. However, challenges remain around managing the mapping system and ensuring reachability.
Traffic Features Extraction and Clustering Analysis for Abnormal Behavior Det...Areej Qasrawi
This document proposes methods for extracting traffic features and using DBSCAN clustering to detect abnormal network behaviors. It extracts four traffic features related to IP addresses, ports, packet types and sizes to capture characteristics. DBSCAN clustering is applied to the feature vectors, classifying traffic into core clusters and isolated points. The isolated points likely represent abnormal behaviors and are analyzed for detection. Experimental results on test network traffic demonstrate the methods can effectively identify abnormal clusters, like those generated by a DDoS attack. The performance is better than alternative K-means clustering which cannot distinguish abnormal behavior clusters as clearly.
This paper targets at a comparative study on the through-puts in bits/ seconds, packet through-puts, delay in networks, response time in seconds of both IPv4 and IPv6. Hence, since the system proposes for co-existence of both IPv4 and IPv6, the solution projected in this paper is “DUAL STACK where you can and TUNNEL where you have to”.
Routing Management with MIRA and enhancement (IMECS2010)Akhmad Zaimi
This document proposes the Minimum Interference Routing Algorithm (MIRA) to optimize routing in an MPLS network. MIRA aims to increase speedy traffic availability while minimizing resource usage. It works by identifying critical links, computing weights for paths, and finding the minimum interference route using Dijkstra's algorithm. The authors model an MPLS network, apply three versions of MIRA, and analyze routing interference and network performance improvements compared to shortest path routing. They conclude that MIRA reduces traffic interference and congestion, optimizing network resources and improving performance metrics.
Splay trees based early packet rejection mechanism against do s traffic targe...Anh Phan
The document proposes a mechanism called Statistical Splaying Filters with Binary Search on Prefix Length (SSF-BSPL) to improve firewall performance against denial of service (DoS) attacks targeting the default security rule. SSF-BSPL optimizes the order of security policy filtering fields using traffic statistics and a multilevel filtering approach based on splay trees and hash tables. It aims to reject unwanted traffic earlier in the filtering process compared to the related Self Adjusting Binary Search on Prefix Length (SA-BSPL) technique. Simulation results showed the proposed mechanism significantly reduced the filtering processing time of DoS traffic targeting the firewall default security rule.
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New RenoIRJET Journal
This document presents a simulation analysis of a new startup algorithm for TCP New Reno to improve responsiveness for short-lived applications. The proposed TCP SYN Loss (TSL) startup algorithm uses a less conservative congestion response than standard TCP when connection setup packets are lost. Simulations are conducted using the ns-2 network simulator to evaluate the performance of TSL variants under different levels of congestion. The main results show that TSL variants can achieve an average latency gain of 15 round-trip times compared to standard TCP at up to 90% link utilization with a packet loss rate of 1%.
EuroMPI 2016 Keynote: How Can MPI Fit Into Today's Big ComputingJonathan Dursi
HTML slides and longer abstract can be found at https://github.com/ljdursi/EuroMPI2016.
For years, the academic science and engineering community was almost alone in pursuing very large-scale numerical computing, and MPI was the lingua franca for such work. But starting in the mid-2000s, we were no longer alone. First internet-scale companies like Google and Yahoo! started performing fairly basic analytics tasks at enormous scale, and since then others have begun tackling increasingly complex and data-heavy machine-learning computations, which involve very familiar scientific computing primitives such as linear algebra, unstructured mesh decomposition, and numerical optimization. These new communities have created programming environments which emphasize what we’ve learned about computer science and programmability since 1994 – with greater levels of abstraction and encapsulation, separating high-level computation from the low-level implementation details.
At about the same time, new academic research communities began using computing at scale to attack their problems - but in many cases, an ideal distributed-memory application for them begins to look more like the new concurrent distributed databases than a large CFD simulation, with data structures like dynamic hash tables and Bloom trees playing more important roles than rectangular arrays or unstructured meshes. These new academic communities are among the first to adopt emerging big-data technologies over traditional HPC options; but as big-data technologies improve their tightly-coupled number-crunching capabilities, they are unlikely to be the last.
In this talk, I sketch out the landscape of distributed technical computing frameworks and environments, and look to see where MPI and the MPI community fits in to this new ecosystem.
The document discusses improving the file transfer service (FTS3) at CERN. It describes two aspects: 1) selecting the best source site for file transfers from among multiple replicas by considering factors like throughput and success rate, not just pending files, and 2) maximizing throughput across the WLCG network by increasing TCP buffer sizes either through Linux auto-tuning or manual configuration. Evaluating different techniques for setting optimal TCP buffer sizes could help effectively utilize available network resources and increase FTS3 transfer speeds.
A Platform for Large-Scale Grid Data Service on Dynamic High-Performance Netw...Tal Lavian Ph.D.
Dynamic High-Performance Networks :
Support data-intensive Grid applications
Gives adequate and uncontested bandwidth to an application’s burst
Employs circuit-switching of large flows of data to avoid overheads in breaking flows into small packets and delays routing
Is capable of automatic end-to-end path provisioning
Is capable of automatic wavelength switching
Provides a set of protocols for managing dynamically provisioned wavelengths
DWDM-RAM :
Encapsulates “optical network resources” into a service framework to support dynamically provisioned and advanced data-intensive transport services
Offers network resources as Grid services for Grid computing
Allows cooperation of distributed resources
Provides a generalized framework for high performance applications over next generation networks, not necessary optical end-to-end
Yields good overall utilization of network resources
The document proposes applying Linked Data principles to services and data streams. It suggests representing service inputs and outputs as Linked Data by encoding parameters in URIs and returning RDF data. For data streams, it recommends using HTTP as an access protocol and streaming RDF triples over an open HTTP connection. This would allow services and streams to be easily integrated and linked with other Linked Data on the web.
Big Linked Data Federation - ExtremeEarth Open WorkshopExtremeEarth
The document summarizes three years of work on the ExtremeEarth project. It describes Semagrow, a federated query processor that can seamlessly integrate data from multiple remote geospatial dataset servers. It was enhanced during ExtremeEarth to federate multiple geospatial sources. The document also describes KOBE, a benchmarking engine for federated query processors. It was re-engineered to run on containers. Finally, the document outlines three ExtremeEarth use cases involving Semagrow, including validating land usage data and combining snow cover and crop type data.
In a network, routers use routing tables to select the best path for transferring data packets between a source and destination based on the network layer of the OSI model. There are two types of routing protocols: interior routing protocols that route packets within an autonomous system and exterior routing protocols that communicate between autonomous systems. Common interior routing protocols include RIP, OSPF, and EIGRP, which use different metrics and algorithms to determine the best path in the routing table.
An Empirical Evaluation of RDF Graph Partitioning TechniquesAdnan Akhter
This document presents an empirical evaluation of seven RDF graph partitioning techniques: horizontal partitioning, subject-based partitioning, predicate-based partitioning, hierarchical partitioning, total communication volume minimization partitioning, recursive-bisection partitioning, and minimal edgecut partitioning. The techniques were evaluated on their partitioning time, query execution time on three systems (FedX, SemaGrow, Koral), total distinct sources selected in a distributed environment, and overall ranking. The results found that total communication volume minimization partitioning had the smallest query runtimes overall and minimized the total number of sources selected, leading to better performance.
Traffic Engineering in Software Defined Networking SDNijtsrd
The traditional single path routing can cause imbalanced link utilization and is not efficient for all traffic types such as long lived large flows. Moreover, it can lead to low network throughput and high network latency. Traffic engineering TE is a key solution to solve these problems of single path. The main purpose of TE is to optimize the network resource utilization and improve network performance by measuring and controlling network traffic. One of the TE approach for large flows is multipath routing which distribute traffic load among available multiple paths. However, most of multipath solutions do not classify traffic flows for example elephant or mice and do not concern the existing delays of routes. Therefore, to be intelligent multipath routing based on traffic types, we proposed three main folds 1 large flow detection approach by using sFlow analyzer in real time, 2 measuring end to end delays of available paths between source node and destination node where large flow occurred and 3 reroute the large flow to minimum round trip time delay path in order to improve network performance. Through experimental results, our proposed method gains over 30 77 throughput improvement over reactive forwarding application which is implemented in ONOS controller. Aung Htein Maw "Traffic Engineering in Software-Defined Networking (SDN)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26618.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-network/26618/traffic-engineering-in-software-defined-networking-sdn/aung-htein-maw
This document discusses concurrency in R and the need for multithreading capabilities. It presents a motivating example of using shared memory via the bigmemoRy package to decouple data processing across multiple R sessions for real-time streaming data analysis. While R itself is single-threaded, packages like bigmemoRy allow sharing data between processes through inter-process communication to enable concurrent processing of streaming data in R.
The document describes a new transition methodology called BD-SIIT for translating between IPv4 and IPv6. BD-SIIT uses a bidirectional mapping algorithm between IPv4 and IPv6 headers and addresses. It avoids embedding the IPv4 address directly into the IPv6 address. Instead, it uses a new address mapping approach based on identifying corresponding public IPv4 and IPv6 addresses.
This document proposes a new communication paradigm called "implicit targeting" to improve the performance of distributed graph processing systems when computing PageRank on very large graphs. It allows partitions to exchange messages containing only payload data by relying on predetermined target ordering. Experiments on a web graph of 38 billion vertices and 3.1 trillion edges achieved PageRank computation times of 34.4 seconds per iteration, suggesting over an order of magnitude improvement over state-of-the-art systems.
To develop an indexing system which helps to build an Unsupervised Indexing for Big Data. With this indexing system one can search for data files not only based on keywords and file names but also with the closest meaningful data to your input content (clustering approach).
The aim of this dissertation project was to investigate and improve the performance of the two most popular link-state routing protocols when configured in IPv4/IPv6 dual-stack enterprise networks. The thesis intended to make the first step of scientific research in performance comparison of different routing protocols in IPv4-IPv6 coexistence dual stack ipv4 and ipv6 coexistence
This document provides an update on perfSONAR network measurement tools, the IRIS and DyGIR projects, the Archipelago measurement platform, network services on TransPAC3 and ACE, and the Data Logistics Toolkit. Key points include:
- perfSONAR and OSCARS software will be used to provide monitoring and dynamic circuit services on TransPAC3 and ACE.
- The IRIS and DyGIR projects will develop monitoring and dynamic circuit software packages for international research networks.
- The Archipelago platform conducts large-scale IPv4 topology measurements from over 50 probes worldwide.
- TransPAC3 and ACE will provide high-performance connectivity between regions and dedicated infrastructure for data movement using the
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...csandit
In the last decade Peer to Peer technology has been thoroughly explored, because it overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive.
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...cscpconf
In the last decade Peer to Peer technology has been thoroughly explored, because it overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive. In this paper we present algorithms for the construction and the maintenance of a hybrid P2P overlay multicast tree based on topological distances. The essential idea of these algorithms is to build a multicast tree by choosing neighbours close to each other. The topological distances can be easily obtained by the browser using the geolocation API. Thus the implementation of algorithms can be done web-based in a distributed manner. We present proofs of our algorithms as well as practical results and evaluations.
Traffic Features Extraction and Clustering Analysis for Abnormal Behavior Det...Areej Qasrawi
This document proposes methods for extracting traffic features and using DBSCAN clustering to detect abnormal network behaviors. It extracts four traffic features related to IP addresses, ports, packet types and sizes to capture characteristics. DBSCAN clustering is applied to the feature vectors, classifying traffic into core clusters and isolated points. The isolated points likely represent abnormal behaviors and are analyzed for detection. Experimental results on test network traffic demonstrate the methods can effectively identify abnormal clusters, like those generated by a DDoS attack. The performance is better than alternative K-means clustering which cannot distinguish abnormal behavior clusters as clearly.
This paper targets at a comparative study on the through-puts in bits/ seconds, packet through-puts, delay in networks, response time in seconds of both IPv4 and IPv6. Hence, since the system proposes for co-existence of both IPv4 and IPv6, the solution projected in this paper is “DUAL STACK where you can and TUNNEL where you have to”.
Routing Management with MIRA and enhancement (IMECS2010)Akhmad Zaimi
This document proposes the Minimum Interference Routing Algorithm (MIRA) to optimize routing in an MPLS network. MIRA aims to increase speedy traffic availability while minimizing resource usage. It works by identifying critical links, computing weights for paths, and finding the minimum interference route using Dijkstra's algorithm. The authors model an MPLS network, apply three versions of MIRA, and analyze routing interference and network performance improvements compared to shortest path routing. They conclude that MIRA reduces traffic interference and congestion, optimizing network resources and improving performance metrics.
Splay trees based early packet rejection mechanism against do s traffic targe...Anh Phan
The document proposes a mechanism called Statistical Splaying Filters with Binary Search on Prefix Length (SSF-BSPL) to improve firewall performance against denial of service (DoS) attacks targeting the default security rule. SSF-BSPL optimizes the order of security policy filtering fields using traffic statistics and a multilevel filtering approach based on splay trees and hash tables. It aims to reject unwanted traffic earlier in the filtering process compared to the related Self Adjusting Binary Search on Prefix Length (SA-BSPL) technique. Simulation results showed the proposed mechanism significantly reduced the filtering processing time of DoS traffic targeting the firewall default security rule.
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New RenoIRJET Journal
This document presents a simulation analysis of a new startup algorithm for TCP New Reno to improve responsiveness for short-lived applications. The proposed TCP SYN Loss (TSL) startup algorithm uses a less conservative congestion response than standard TCP when connection setup packets are lost. Simulations are conducted using the ns-2 network simulator to evaluate the performance of TSL variants under different levels of congestion. The main results show that TSL variants can achieve an average latency gain of 15 round-trip times compared to standard TCP at up to 90% link utilization with a packet loss rate of 1%.
EuroMPI 2016 Keynote: How Can MPI Fit Into Today's Big ComputingJonathan Dursi
HTML slides and longer abstract can be found at https://github.com/ljdursi/EuroMPI2016.
For years, the academic science and engineering community was almost alone in pursuing very large-scale numerical computing, and MPI was the lingua franca for such work. But starting in the mid-2000s, we were no longer alone. First internet-scale companies like Google and Yahoo! started performing fairly basic analytics tasks at enormous scale, and since then others have begun tackling increasingly complex and data-heavy machine-learning computations, which involve very familiar scientific computing primitives such as linear algebra, unstructured mesh decomposition, and numerical optimization. These new communities have created programming environments which emphasize what we’ve learned about computer science and programmability since 1994 – with greater levels of abstraction and encapsulation, separating high-level computation from the low-level implementation details.
At about the same time, new academic research communities began using computing at scale to attack their problems - but in many cases, an ideal distributed-memory application for them begins to look more like the new concurrent distributed databases than a large CFD simulation, with data structures like dynamic hash tables and Bloom trees playing more important roles than rectangular arrays or unstructured meshes. These new academic communities are among the first to adopt emerging big-data technologies over traditional HPC options; but as big-data technologies improve their tightly-coupled number-crunching capabilities, they are unlikely to be the last.
In this talk, I sketch out the landscape of distributed technical computing frameworks and environments, and look to see where MPI and the MPI community fits in to this new ecosystem.
The document discusses improving the file transfer service (FTS3) at CERN. It describes two aspects: 1) selecting the best source site for file transfers from among multiple replicas by considering factors like throughput and success rate, not just pending files, and 2) maximizing throughput across the WLCG network by increasing TCP buffer sizes either through Linux auto-tuning or manual configuration. Evaluating different techniques for setting optimal TCP buffer sizes could help effectively utilize available network resources and increase FTS3 transfer speeds.
A Platform for Large-Scale Grid Data Service on Dynamic High-Performance Netw...Tal Lavian Ph.D.
Dynamic High-Performance Networks :
Support data-intensive Grid applications
Gives adequate and uncontested bandwidth to an application’s burst
Employs circuit-switching of large flows of data to avoid overheads in breaking flows into small packets and delays routing
Is capable of automatic end-to-end path provisioning
Is capable of automatic wavelength switching
Provides a set of protocols for managing dynamically provisioned wavelengths
DWDM-RAM :
Encapsulates “optical network resources” into a service framework to support dynamically provisioned and advanced data-intensive transport services
Offers network resources as Grid services for Grid computing
Allows cooperation of distributed resources
Provides a generalized framework for high performance applications over next generation networks, not necessary optical end-to-end
Yields good overall utilization of network resources
The document proposes applying Linked Data principles to services and data streams. It suggests representing service inputs and outputs as Linked Data by encoding parameters in URIs and returning RDF data. For data streams, it recommends using HTTP as an access protocol and streaming RDF triples over an open HTTP connection. This would allow services and streams to be easily integrated and linked with other Linked Data on the web.
Big Linked Data Federation - ExtremeEarth Open WorkshopExtremeEarth
The document summarizes three years of work on the ExtremeEarth project. It describes Semagrow, a federated query processor that can seamlessly integrate data from multiple remote geospatial dataset servers. It was enhanced during ExtremeEarth to federate multiple geospatial sources. The document also describes KOBE, a benchmarking engine for federated query processors. It was re-engineered to run on containers. Finally, the document outlines three ExtremeEarth use cases involving Semagrow, including validating land usage data and combining snow cover and crop type data.
In a network, routers use routing tables to select the best path for transferring data packets between a source and destination based on the network layer of the OSI model. There are two types of routing protocols: interior routing protocols that route packets within an autonomous system and exterior routing protocols that communicate between autonomous systems. Common interior routing protocols include RIP, OSPF, and EIGRP, which use different metrics and algorithms to determine the best path in the routing table.
An Empirical Evaluation of RDF Graph Partitioning TechniquesAdnan Akhter
This document presents an empirical evaluation of seven RDF graph partitioning techniques: horizontal partitioning, subject-based partitioning, predicate-based partitioning, hierarchical partitioning, total communication volume minimization partitioning, recursive-bisection partitioning, and minimal edgecut partitioning. The techniques were evaluated on their partitioning time, query execution time on three systems (FedX, SemaGrow, Koral), total distinct sources selected in a distributed environment, and overall ranking. The results found that total communication volume minimization partitioning had the smallest query runtimes overall and minimized the total number of sources selected, leading to better performance.
Traffic Engineering in Software Defined Networking SDNijtsrd
The traditional single path routing can cause imbalanced link utilization and is not efficient for all traffic types such as long lived large flows. Moreover, it can lead to low network throughput and high network latency. Traffic engineering TE is a key solution to solve these problems of single path. The main purpose of TE is to optimize the network resource utilization and improve network performance by measuring and controlling network traffic. One of the TE approach for large flows is multipath routing which distribute traffic load among available multiple paths. However, most of multipath solutions do not classify traffic flows for example elephant or mice and do not concern the existing delays of routes. Therefore, to be intelligent multipath routing based on traffic types, we proposed three main folds 1 large flow detection approach by using sFlow analyzer in real time, 2 measuring end to end delays of available paths between source node and destination node where large flow occurred and 3 reroute the large flow to minimum round trip time delay path in order to improve network performance. Through experimental results, our proposed method gains over 30 77 throughput improvement over reactive forwarding application which is implemented in ONOS controller. Aung Htein Maw "Traffic Engineering in Software-Defined Networking (SDN)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26618.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-network/26618/traffic-engineering-in-software-defined-networking-sdn/aung-htein-maw
This document discusses concurrency in R and the need for multithreading capabilities. It presents a motivating example of using shared memory via the bigmemoRy package to decouple data processing across multiple R sessions for real-time streaming data analysis. While R itself is single-threaded, packages like bigmemoRy allow sharing data between processes through inter-process communication to enable concurrent processing of streaming data in R.
The document describes a new transition methodology called BD-SIIT for translating between IPv4 and IPv6. BD-SIIT uses a bidirectional mapping algorithm between IPv4 and IPv6 headers and addresses. It avoids embedding the IPv4 address directly into the IPv6 address. Instead, it uses a new address mapping approach based on identifying corresponding public IPv4 and IPv6 addresses.
This document proposes a new communication paradigm called "implicit targeting" to improve the performance of distributed graph processing systems when computing PageRank on very large graphs. It allows partitions to exchange messages containing only payload data by relying on predetermined target ordering. Experiments on a web graph of 38 billion vertices and 3.1 trillion edges achieved PageRank computation times of 34.4 seconds per iteration, suggesting over an order of magnitude improvement over state-of-the-art systems.
To develop an indexing system which helps to build an Unsupervised Indexing for Big Data. With this indexing system one can search for data files not only based on keywords and file names but also with the closest meaningful data to your input content (clustering approach).
The aim of this dissertation project was to investigate and improve the performance of the two most popular link-state routing protocols when configured in IPv4/IPv6 dual-stack enterprise networks. The thesis intended to make the first step of scientific research in performance comparison of different routing protocols in IPv4-IPv6 coexistence dual stack ipv4 and ipv6 coexistence
This document provides an update on perfSONAR network measurement tools, the IRIS and DyGIR projects, the Archipelago measurement platform, network services on TransPAC3 and ACE, and the Data Logistics Toolkit. Key points include:
- perfSONAR and OSCARS software will be used to provide monitoring and dynamic circuit services on TransPAC3 and ACE.
- The IRIS and DyGIR projects will develop monitoring and dynamic circuit software packages for international research networks.
- The Archipelago platform conducts large-scale IPv4 topology measurements from over 50 probes worldwide.
- TransPAC3 and ACE will provide high-performance connectivity between regions and dedicated infrastructure for data movement using the
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...csandit
In the last decade Peer to Peer technology has been thoroughly explored, because it overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive.
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...cscpconf
In the last decade Peer to Peer technology has been thoroughly explored, because it overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive. In this paper we present algorithms for the construction and the maintenance of a hybrid P2P overlay multicast tree based on topological distances. The essential idea of these algorithms is to build a multicast tree by choosing neighbours close to each other. The topological distances can be easily obtained by the browser using the geolocation API. Thus the implementation of algorithms can be done web-based in a distributed manner. We present proofs of our algorithms as well as practical results and evaluations.
In the last decade Peer to Peer technology has been thoroughly explored, becauseit overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive.
In this paper we present algorithms for the construction and the maintenance of a hybrid P2P overlay multicast tree based on topological distances. The essential idea of these algorithms is to build a multicast tree by choosing neighbours close to each other. The topological distances can be easily obtained by the browser using the geolocation API. Thus the implementation of algorithms can be done web-based in a distributed manner.
We present proofs of our algorithms as well as experimental results and evaluations.
Automated Traffic Classification And Application Identification Using Machine...Jennifer Daniel
This document proposes a novel method for classifying network traffic flows using unsupervised machine learning. Statistical flow characteristics are used to automatically classify flows without relying on port numbers or protocol decoding. The method is evaluated using real network traffic traces, with the goal of optimizing classification accuracy while minimizing computational resources. Feature selection is used to determine an optimal set of statistical flow attributes for classification. The method provides benefits for network management, security, and traffic engineering.
This document compares the performance of IPv4, IPv6, and tunneling (6to4) networks using computer simulations in OPNET 17.5. The simulation analyzed delay, throughput, and packet loss over 1 hour. The results showed that IPv6 had higher delay than IPv4 due to its larger header, while tunneling had the highest delay. Throughput was highest for IPv6 and lowest for IPv4. Packet loss was lowest for IPv4 and highest for IPv6. In conclusion, the network performance varied between the different addressing schemes and tunneling technique.
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...IOSR Journals
This document compares the performance of IPv4, IPv6, and tunneling (6to4) networks using computer simulations in OPNET 17.5. The simulation analyzed delay, throughput, and packet loss over 1 hour. The results showed that IPv6 had higher delay than IPv4 due to its larger header, while tunneling had the highest delay. Throughput was highest for IPv6 and lowest for IPv4. Packet loss was lowest for IPv4 and highest for IPv6. In conclusion, the network performance varied between the different addressing schemes and tunneling in terms of delay, throughput, and packet loss.
The document discusses network traffic analysis and planning. It describes characterizing existing network usage, including identifying user communities, applications used, traffic flows, locations and bandwidth requirements. It also covers planning for network expansions, including quantifying performance and verifying service quality. Different types of traffic flows are defined, such as client/server, peer-to-peer and terminal/host. Challenges in planning for voice over IP networks and issues caused by excessive broadcast traffic are also addressed.
An Optimal Algorithm For Relay Node Assignment In Cooperative Ad Hoc NetworksNancy Ideker
The document presents an optimal polynomial time algorithm called ORA for solving the relay node assignment problem in cooperative ad hoc networks. The goal is to assign available relay nodes to multiple competing source-destination pairs in order to maximize the minimum data rate among all pairs.
The key contributions are:
1) Developing the ORA algorithm that uses a "linear marking" mechanism to achieve polynomial time complexity for relay node assignment.
2) Providing a formal proof that ORA finds the optimal solution.
3) Demonstrating via numerical results that ORA efficiently assigns relay nodes to maximize the minimum data rate.
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET Journal
This document discusses using the TCPDUMP command to analyze network protocol packets for IPv4 and IPv6 on a local area network. TCPDUMP is used to capture network packets and display information like timestamps, source/destination IP addresses, and source/destination MAC addresses. Network administrators can use packet analysis to monitor network activity and traffic, troubleshoot problems, and improve network performance and efficiency. The methodology section describes how TCPDUMP can be used to analyze IPv4 and IPv6 packets and perform tasks like protocol analysis, identifying top network users, analyzing network activity by time or port number, and reconstructing communication between devices.
The document discusses planning, optimizing, and evaluating performance of a TCP/IP network. It describes how to plan TCP/IP addressing structures and subnet configurations. Methods for selecting IP configuration, evaluating network performance using tools, and calculating actual data throughput are presented. Optimizing network performance involves determining if the network is overloaded and monitoring bandwidth utilization.
Assessing Buffering with Scheduling Schemes in a QoS Internet RouterIOSR Journals
This document examines different scheduling algorithms that could be used with RIO-C penalty enforcement buffering in a multi-queue QoS router to improve network performance. It simulates priority, round robin, and weighted round robin scheduling with RIO-C buffering. The results show that priority scheduling achieved the lowest loss rates, with 29.46% scheduler drop rate and 14.95% RED loss rate. Round robin was second with 29.53% and 10.50% losses. Weighted round robin was third with 30.28% and 3.04% losses. The document concludes that a network seeking quality of service could adopt priority scheduling with RIO-C admission control.
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
The information and communication technologies (ICT) integrate different types of wireless communication to
provide IT-enabled services and applications. The great majority end devices are equipped with multiple network
interfaces such as Wi-Fi and 4G. Our goal is to integrate the available network interfaces and technologies to
enhance seamless communication efficiency and increase resources utilization. We proposed a heterogeneous
network management algorithm based on machine learning methods which includes roaming and sharing
functions. The roaming function provides the multiple network resources in physical and media access control
layers. The sharing function supports multiple network resources allocation and the service handover process
based on the Multi-Path TCP protocol. The simulation result also shows that the proposed scheme can increase
the network bandwidth utilization effectively. The sharing system could be used in home, mobile and vehicular
environments to realize ubiquitous social sharing networks.
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
1) The document describes a machine learning-based network sharing system that uses Multipath TCP to integrate multiple network interfaces and allocate bandwidth resources for multiple users.
2) The system includes roaming and sharing functions, where roaming chooses the best network and sharing allocates resources across available networks.
3) A heterogeneous network management algorithm is proposed that monitors network status, predicts handovers between networks, and uses a machine learning approach to optimize resource utilization and load balancing across different network interfaces.
The document describes two experiments conducted using the OPNET simulation tool. Experiment 1 involves simulating a TCP network using different congestion control mechanisms and analyzing OSPF routing. Experiment 2 compares the bus and star network topologies by creating networks with each in OPNET and collecting statistics on traffic and delay. The objectives are to get familiar with OPNET, study TCP algorithms, simulate OSPF routing, and understand the pros and cons of different topologies. Tasks for each experiment are described in detail, including how to set up the simulations, configure nodes and links, select statistics, and run the simulations.
The document provides an overview of Packet over SONET/SDH (PoS) and related technologies. It discusses the OSI model and various internet protocols like TCP, UDP, IP, and how they relate to PoS. PoS allows efficient transport of IP traffic over SONET/SDH networks. It offers benefits like utilizing existing infrastructure while efficiently transporting various data, voice, and video traffic with less overhead than alternative protocols. The document also covers applications and measurements of PoS performance and connectivity.
A location based least-cost scheduling for data-intensive applicationsIAEME Publication
This document summarizes a research paper that proposes a location-based least-cost scheduling algorithm for transferring multiple data-intensive files simultaneously to multiple compute nodes in a grid environment. The proposed model includes an optimized meta-scheduler that receives multiple files, predicts the optimal number of parallel TCP streams to use for each file transfer based on sampling, and schedules the files to compute nodes using a greedy algorithm that considers location and cost. Experimental results showed the optimized model achieved better transfer times and throughput compared to non-optimized transfers.
Model-driven Telemetry: The Foundation of Big Data AnalyticsCisco Canada
This document discusses model-driven telemetry. It begins by explaining the origins of telemetry, noting its use in applications like military, medical, and networking. It then discusses telemetry use cases like network health monitoring, troubleshooting, and capacity planning. Next, it covers challenges with traditional telemetry methods like SNMP and syslog being too slow, incomplete, and hard to operationalize. The document then introduces the concepts of streaming telemetry and model-driven telemetry as an improved approach, discussing how it is based on open standards like YANG data models, gRPC protocol, and protocol buffer encodings. It provides examples of configuring sensors, destinations, and subscriptions on Cisco networking devices.
OSPF (Open Shortest Path First) Case Study: Anil NembangAnil Nembang
- The document discusses Open Shortest Path First (OSPF) configuration for a network comprising routers and PCs partitioned into 4 areas.
- An addressing scheme is proposed using /30 subnet masking to assign point-to-point interfaces between routers in areas 120, 120, and 120. Area 99 is an OSPF multi-access network requiring a different approach.
- OSPF is configured on the network with areas and interfaces assigned addresses according to the proposed scheme. A virtual link is also specified to connect the non-contiguous areas as required.
Similar to Delivering Application-Layer Traffic Optimization (ALTO) Services based on Public Routing Data at IXPs (20)
Determination of Equivalent Circuit parameters and performance characteristic...pvpriya2
Includes the testing of induction motor to draw the circle diagram of induction motor with step wise procedure and calculation for the same. Also explains the working and application of Induction generator
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Impartiality as per ISO /IEC 17025:2017 StandardMuhammadJazib15
This document provides basic guidelines for imparitallity requirement of ISO 17025. It defines in detial how it is met and wiudhwdih jdhsjdhwudjwkdbjwkdddddddddddkkkkkkkkkkkkkkkkkkkkkkkwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwioiiiiiiiiiiiii uwwwwwwwwwwwwwwwwhe wiqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq gbbbbbbbbbbbbb owdjjjjjjjjjjjjjjjjjjjj widhi owqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq uwdhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhwqiiiiiiiiiiiiiiiiiiiiiiiiiiiiw0pooooojjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj whhhhhhhhhhh wheeeeeeee wihieiiiiii wihe
e qqqqqqqqqqeuwiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiqw dddddddddd cccccccccccccccv s w c r
cdf cb bicbsad ishd d qwkbdwiur e wetwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww w
dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffw
uuuuhhhhhhhhhhhhhhhhhhhhhhhhe qiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii iqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc ccccccccccccccccccccccccccccccccccc bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbu uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuum
m
m mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm m i
g i dijsd sjdnsjd ndjajsdnnsa adjdnawddddddddddddd uw
4. Distributed Applications
4
Introduction
File sharing applications, Content Delivery
Networks (CDNs), real-time communication,
among others, use a significant amount of
network resource to connect nodes across the
Internet and transfer a large amount of data.
5. Distributed Applications
5
Introduction
✓Topological information used only has a
localized view provided by the ISPs.
✓Without knowledge of the underlying
network topology.
✓Selection of resources are provided
randomly.
✓Impacting both applications and networking
infrastructure.
6. 6
MOTIVATION Application-Layer Traffic Optimization (ALTO)
ISP => Focus of ALTO implementations
Internet eXchange Point (IXP)
Third-parties => ALTO Information <=ALTO Protocol
Introduction
9. 9
Background :
Internet eXchange Point (IXP)
A shared
network
infrastructure
The Internet
performance is
optimized
Multilateral
peering
Allow bilateral
agreements
See IX.br
public service
approach (CGI)
11. Related Work11
BGP Informationfrom LG Servers
Brito et al. [1] collected BGP information from public IXPs operating in
Brazil. It was one of the first (if not the first) efforts to comprehend the
ecosystem operation of Brazilian IXPs. Some result: AS-level connectivity
graphs, Peering density, Depth of AS-PATH, etc.
The authors in [2] collected raw data from 245 LG servers across 110
countries. They create and analyze the LG server-based AS topology against
BGP (IRL [3]), traceroute (Ark [4] and iPlane [5]), and IRR [6] based AS
topologies. Among other results, they observed 11 K new ASes links and
686 new ASes.
12. Related Work12
Provide Network Topology Information
Choffnes et al. [7], Bonaventure et al. [8] and Xie et al. [9] provide a P2P
mechanism to find reliable information source to apply better-than-random
peer selection, but not in the form of ALTO services (i.e. difficult to deploy
globally without an open standard).
13. Related Work13
Create and/or Provide ALTO Information
The work in [10] creates network topology and cost maps for ALTO from
public sources of information, specifically using the United States Federal
Communications Commission (FCC) public database from the Measuring
Broadband America (MBA) program.
Pinthong et al. [11] and Guanxiu et al. [12] explore the ALTO protocol by
mapping IP addresses to an AS, to create a network map and BGP route
announcements from ASes to create a cost map. Both maps were created
by using simulation platforms (PeerSim and GPS, respectively).
SHIBUYA et al. [13] uses a SQL-based database for storing the Prefix List
and the Priority Map.
15. MAIN OBJECTIVE: Create and provide Application-Layer Traffic Optimization (ALTO)
services based on public information, more specifically, public routing information
at Brazilian Internet eXchange Points (IXPs).
Objectives15
Issue: Random selection
of available peers
Provide a mechanism for offering peers the information that
enables the selection of the nearest neighbors rather than making
a random selection.
Issue: Cannot directly use
traditional traffic
optimization techniques
The provision of external services with knowledge of network
topologycould highlyimpact application performance.
Issue: Limited knowledge
of the underlying network
topology
The provision of a service that works on a layer above and that has
a better understanding of the underlying network would give
applications a detailedguide to get the desired resources.
18. Design of ALTO-as-a-Service (AaaS) :
Acquiring Input Data18
Each IXPs is
publicly
accessed
BGP
commands
are
executed
Raw dataset is
locally stored
Raw data pass
through a pre-
processing
23. 23
1http://ix.br
2http://ix.br/particip, Accessed: September, 2015
3http://ix.br/trafego, Accessed: May, 2015
Prototype Implementation:
Input: IX.br BGP Data Set
IXPs are part of PTTMetro
project1, created to promote the
necessary infrastructure for
direct interconnection between
networks of Brazilian
metropolitan regions.
25
The largest IXP ecosystem in
Latin America and one of the
world’s top ten.
1
Members2.
+1.0 Tbps average throughput 31374
GB of real BGP data.
+2.5
24. Prototype Implementation :
ALTO Server Backend:24
1. Network Map
✓ The ASNs serve as our grouping, with each ASN corresponds to a PID.
✓ Each prefix (be it IPv4 and IPv6) will be associatewith a particular group.
2. Cost Map
✓ Path costs = The topological distance, expressed in the number of traversed AS.
✓ Two Cost Maps: Absolutedistanceand Relativedistance.
25. Prototype Implementation:
ALTO Server Front-End: OpenDaylight25
✓ALTO in ODL is focused on implementing basic ALTO services as RESTful web
services (Northbound APIs) for ALTO client/server communications.
✓ALTO Northbound APIs generate ALTO services from data stored in the MD-SAL data
store (an ODL core component)
▪ It was necessary to modify the Northbound APIs to generate ALTO services from the data
stored in the Neo4j GDB (instead of the MD-SAL topology).
28. Experimental Evaluation :
System Performance Profiling28
Response processing time for the Network and Cost Map (Absolute Distance) services
29. Experimental Evaluation :
1) IP Endpoint Selection with AaaS (strawman)29
✓ 19 ASes, each represented by a switch abstraction in the Mininet emulator.
✓ The large AS switch represents the IXP.
✓ Links between ASes were set with larger bandwidth and lower delay when closer to the IXP.
✓ 10 communicatingpeers are represented as Mininet hosts attached to the switches.
30. Experimental Evaluation :
1) IP Endpoint Selection with AaaS (strawman)30
Workload and Metrics
✓ With a background traffic using the D-ITG traffic sending TCP traffic (512 byte packet size, 1,000
pps rate).
✓ We run end-to-end round-trip time measurements and available bandwidth with the remaining nine
hosts using ping and iperf tools, respectively.
ALTO information
ALTO Clients
✓ Hosts whose ASes are directly connectedat IXP (ie., h1, h2, h3).
Absolute distance (HopsNumber) Relative distance (HopsNumberPTT)
31. Experimental Evaluation :
Network Latency and Throughput31
Results Analysis
✓ Improvementsin latency and throughput of up to 29%.
✓ In a few cases, peers selected through AaaS ended with less bandwidth or higher latency
(between 1% and 11%) : Shortest paths not necessary the best performingones.
✓ When h3 uses the IXP infrastructureto select a peer (h1), as HopsNumberPTTsuggests, further
throughput improvements(up to 26%).
Latency Bandwidth
Without ALTO
(Random selection)
32. Experimental Evaluation :
2)Inter-Domain Traffic Reduction32
✓ we re-use a Java implementation of the BitTorrent protocol1
• trackerBT: Single and easy-to-useTracker.
• jbittorrent:Allows the creation of torrent files and the download
and sharing of files between peers (JBIT).
✓ A new packagebased on the jbittorrentAPI was generated to
consumethe ALTO services (JBIT_AaaS).
1https://github.com/cloudspaces/jbittorrent
33. Experimental Evaluation :
2) Inter-Domain Traffic Reduction33
Workload and Metrics
✓ Two scenarios:
1. Better-than-randompeer selection using an ALTO server (JBIT_AaaS).
2. Peer selection following the standard workflow of the BitTorrent protocol (JBIT).
✓ Each SRC peer generatesa samplewith the number of pieces extracted from the DST peers.
• Since each peer is associated with an ASN, we compute the amount of AS-hops to reach DST peers.
• Finally, we calculate the number of pieces retrieved in a given number of AS-hops from a SRC peer.
ALTO information
ALTO Clients
✓ Hosts whose ASes are directly connectedat IXP (AS1, AS2 and AS3).
Absolute distance (HopsNumber)
34. Experimental Evaluation :
AS-Hops Distribution34
Results Analysis
✓ The higher concentration of pieces downloaded is at a depth between 2 to 5 AS-hops.
• The average number of AS-level hops varies between 3.5 and 4.3 hops.
✓ Selecting DST peers using JBIT_AaaS has a better performance. The higher concentration of pieces
downloadedis at a depth between 0 and 2 AS-hops.
• The average number of AS-hops is between 1.9 and 2.1 AS-hops.
AS1 AS2 AS3
35. Experimental Evaluation :
Accumulated AS-Level Hops35
Results Analysis
✓ Over 28% of the times, peers selected by JBIT_AaaS do not leave the source AS, this is more than three
times the performance achievablethrough JBIT (9%) at random.
✓ 50% of the total pieces are retrieved at a depth of 1 and 2 AS-hops, while JBIT-recommended peers in
the same depth can only download 28% of the blocks for a file.
✓ The sum of pieces retrieved from AS8, AS9 and AS10 through SRC peers running the JBIT_AaaS API
(7%) is less than three times the sum of pieces retrieved at random by JBIT (24%).
36. Experimental Evaluation :
3) Performance Improvement of a Real P2P App.36
✓ We use a single SRC peer located on University of Campinas(ASN: 53187).
• Our Java implementation supports only HTTP GET requests to the TCP-based Trackers.
✓ Max number of DST peer list to receive from a Tracker is 100 (only IPv4 addresses) and half of peers
are selected for the final DST peer list.
✓ JBIT_AaaS: A new input parameter is added in order to obtain the absolute o relative distance between
SRC peer and DST peers.
37. Experimental Evaluation :
Global Download Rate37
Results Analysis
✓ The difference of median download rates for JBIT_AaaS and
JBIT is between 166 and 178 KBytes/s. Exceptions: torrent2
(30 KBytes/s) and torrent3 (-26 KBytes/s).
✓ JBIT provides the highest peaks of download rate (torrent2,
torrent4 and torrent5).
✓ The difference in median download rate is above 300 KBytes/s
(torrent3 and torrent4), reaching around 500 KBytes/s in the
case of torrent2. Exceptions: torrent5 (163 Kbytes/s) and
torrent1 (-29 KBytes/s).
✓ JBIT achieves the higher peak download rate of all our
experiments(5426 KBytes/s).
38. Experimental Evaluation :
Mean Global Download Rate (95% CL)38
✓ torrent1, torrent2 and torrent4: We can state at 95% of confidence that JBIT_AaaS have a higher
download ratethan JBIT at random.
✓ torrent3, torrent4 and torrent5: our approach (JBIT_AaaS) shows statistically significantly better
download ratethan a standard Bit-Torrent protocol.
✓ Others torrents: it is not possible to state that JBIT_AaaS has a better performance than JBIT or vice
versa.
39. Experimental Evaluation :
Destination Peer Statistics (1/2)39
✓ JBIT splits each download rate into a large and random number of peers. JBIT_AaaS connects to the
same set of peers continuously.
✓ JBIT: each connection obtainsa relatively low individual transfer rate.
✓ JBIT_AaaS obtainsa CC valuegreater than peers randomly selected by JBIT.
✓ # ASes reached by JBIT_AaaS proves to be lower than the number of ASes selected by a JBIT.
✓ Depth varies between 3.7 and 3.9 (JBIT) and Depth valueslie between 3.5 and 3.6 (JBIT_AaaS).
40. Experimental Evaluation :
Destination Peer Statistics (2/2)40
✓ JBIT splits each download rate into a large and random number of peers. JBIT_AaaS connects to the
same set of peers continuously.
✓ JBIT: each connection obtainsa relatively low individual transfer rate.
✓ JBIT_AaaS obtainsa CC valuegreater than peers randomly selected by JBIT.
✓ # ASes reached by JBIT_AaaS proves to be lower than the number of ASes selected by a JBIT.
✓ Depth varies between 3.6 and 3.8 (JBIT) and Depth valueslie between 3.4 and 3.6 (JBIT_AaaS).
41. Experimental Evaluation :
Total Download Time41
Results Analysis
✓ The maximumvalues were obtainedby JBIT.
✓ The differenceof median valuesare generally in favourof JBIT_AaaS.
• HopsNumber: The greatest median difference is calculated in torrent4 (-80 seg.)
• HopsNumberPTT: Torrent4 achieves the best difference (-169 seg.).
43. 43
Future work
✓The Cost Map rankings are based on relatively static AS-Path distance and do
not consider more dynamic information such as actual bandwidth, latency,
packet loss rate, etc.
▪ Thus, dynamic updates of cost maps based on public Internet quality measurements
(e.g., SIMET, RIPE TTM) are in our research agenda.
✓Implement the remaining ALTO services (e.g., full Map-Service, EPS and ECS).
✓Prototype performance optimization (e.g., Neo4j query tuning techniques, Linux
fs configuration, security).
✓The AaaS workflow does not handle periodic updates (e.g. when a new dataset
is retrieved) and a single snapshot was used in order to built the ALTO
information.
▪ Therefore, the creation of a procedural flow where the AaaS can support scenarios with
multipledatasetsis at the top in our futureresearch activities.
45. 45
Conclusions
✓This is the first work that explores the use of Inter-domain routing data publicly
available at IXPs to create abstract topology and cost maps following the
recently standardized IETF ALTO protocol.
✓Our proposed architecture (AaaS) encompasses the whole process of ALTO
service delivery.
✓Our AaaS prototype is based on the popular Neo4j graph database and the
OpenDaylight controller and validated the potential of applications to leverage
the network awareness provided by ALTO servers.
✓Our approach can reduce the amount of traffic that crosses network
boundaries, resulting in ISPs’ cost reductions and ALTO service providers (in our
case IX.br operators) can benefit from increased IXP traffic exchange.
46. 46
Publications
✓ LACHOS, D. A. ; BRITO, S. H. B. ; FONTES, R. R. ; ROTHENBERG, C. E. . Delivering Application-
Layer Traffic Optimization Services based on Public Routing Data at Internet eXchange Points.
In: XXXIV Simpósio Brasileiros de Redes de Computadores SBRC 2016, Salvador, BA, Brazil, Jun
2016.
✓ BRITO, S. H. B.; SANTOS, M. A. S. ; FONTES, R. R. ; LACHOS, D. A. ; ROTHENBERG, C. E. .
Dissecting the Largest National Ecosystem of Public Internet eXchange Points in Brazil. In:
Passive and Active Measurements PAM 2016, Hereklion, Crete, Greece, 2016.
✓ LACHOS, D.A.; ROTHENBERG, C. E. . Delivering Application-Layer Traffic Optimization Services
based on Public Routing Information at Internet eXchange Points. In: VIII Encontro dos Alunos e
Docentes do Departamento de Engenharia de Computação e Automação Industrial 2015,
Campinas,SP, Brazil, Set 2015.
✓ BRITO, S. H. B.; SANTOS, M. A. S. ; FONTES, R. R. ; LACHOS, D. A. ; ROTHENBERG, C. E. .
Anatomia do Ecossistema de Pontos de Troca de Tráfego Públicos na Internet do Brasil. In:
XXXIII Simpósio Brasileiros de Redes de Computadores SBRC 2015, Vitória, ES, Brazil, May
2015.
49. [1] S. H. B. Brito, M. A. S. Santos, R. dos Reis Fontes, D. A. L. Perez, and C. E.
Rothenberg, “Anatomia do ecossistema de pontos de troca de trafego publicos na
internet do brasil,” In XXXIII Simposio Brasileiro de Redes de Computadores
(SBRC). May 18-22, 2015. Vitoria, ES, Brazil.
[2] A. Khan, T. Kwon, H.-c. Kim, and Y. Choi, “As-level topology collection through
looking glass servers,” in Proceedings of the 2013 Conference on Internet
Measurement Conference, IMC '13, (New York, NY, USA), pp. 235-242, ACM, 2013.
[3] UCLA IRL. http://irl.cs.ucla.edu/topology.
[4] CAIDA ARK. http://www.caida.org/projects/ark.
[5] H. V. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy,
and A. Venkataramani, “iplane: An information plane for distributed services,” in
Proceedings of the 7th symposium on Operating systems design and
implementation, pp. 367-380,USENIX Association, 2006.
[6] Internet Routing Registry. http://www.irr.net.
References49
50. [7] CHOFFNES, D. R.; BUSTAMANTE, F. E. Taming the torrent: a practical approach to
reducing cross-isp traffic in peer-to-peer systems. In: ACM. ACM SIGCOMM
Computer Communication Review. [S.l.], 2008. v. 38, n. 4, p. 363–374. Citado 2
vezes nas páginas 29 and 31.
[8] BONAVENTURE, O.; SAUCEZ, D.; DONNET, B. The case for an informed path
selection service. [S.l.], 2008. Citado 2 vezes nas páginas 29 and 31.
[9] XIE, H.; YANG, Y. R.; KRISHNAMURTHY, A.; LIU, Y. G.; SILBERSCHATZ, A. P4p:
Provider portal for applications. In: ACM. ACM SIGCOMM Computer Communication
Review. [S.l.], 2008. v. 38, n. 4, p. 351–362. Citado 2 vezes nas páginas 30 and 31.
[10] V. K. Gurbani, D. Goergen, R. State, and T. Engel, “Making historical
connections: Building application layer trac optimization (ALTO) network and cost
maps from public broadband data,” in 10th International Conference on Network
and Service Management, CNSM 2014 and Workshop, Rio de Janeiro, Brazil,
November 17-21, 2014 (D. Raz, M. Nogueira, E. R. M. Madeira, B. Jennings, L. Z.
Granville, and L. P. Gaspary, eds.), pp. 193-198, IEEE, 2014.
References50
51. [11] PINTHONG, N.; LILAKIATSAKUN, W. Performance of bittorrent-like p2p file
sharing systems inspired by alto. In: TENCON IEEE Region 10 Conference (31194).
[S.l.: s.n.], 2013. Citado 2 vezes nas páginas 28 and 31.
[12] GUANXIU, L.; SUQI, Y.; XINLI, H. A Novel ALTO Scheme for BitTorrent-Like P2P
File Sharing Systems. In: Proceedings of the 2013 Third International Conference
on Intelligent System Design and Engineering Applications. [S.l.: s.n.], 2013. Citado
2 vezes nas páginas 28 and 31.
[13] SHIBUYA, M.; HEI, Y.; OGISHI, T. ISP-friendly peer selection mechanism with
ALTO-like server. In: Network Operations and Management Symposium (APNOMS).
[S.l.: s.n.], 2011. Citado 2 vezes nas páginas 29 and 31.
References51
52. Create the ALTO information and populate the graph DB
1. Grouping of prefixesinto PID (Network Map) by ASes, IXPs, BGP communities,points of presence,
just to cite a few examples.
2. Defining the preferences/ costs between the groups PID (Cost Map) expressed on a path cost such
as physicaldistancebetween IXPs, topological distancesbetween ASes, etc.
Design of ALTO-as-a-Service (AaaS) :
Creating and Delivering ALTO Information52
Delivering ALTO Services
The last step is deployingan ALTO web server implementingthe client-serverprotocol deliveringthe
REST/JSON APIs to ALTO clientsas defined by RFC7285.
53. Experimental Evaluation :
System Performance Profiling (2/2)53
Processing time used to compute two additional steps (the number of hops and insert it
into database).
54. Experimental Evaluation :
Use Case Scenario54
Processing Network Latency (ms) in a scenario with no traffic expressed as RTT AVG
and RTT MDEV.