100,825 research outputs found

    Monitoring Challenges and Approaches for P2P File-Sharing Systems

    Get PDF
    Since the release of Napster in 1999, P2P file-sharing has enjoyed a dramatic rise in popularity. A 2000 study by Plonka on the University of Wisconsin campus network found that file-sharing accounted for a comparable volume of traffic to HTTP, while a 2002 study by Saroiu et al. on the University of Washington campus network found that file-sharing accounted for more than treble the volume of Web traffic observed, thus affirming the significance of P2P in the context of Internet traffic. Empirical studies of P2P traffic are essential for supporting the design of next-generation P2P systems, informing the provisioning of network infrastructure and underpinning the policing of P2P systems. The latter is of particular significance as P2P file-sharing systems have been implicated in supporting criminal behaviour including copyright infringement and the distribution of illegal pornograph

    Bootstrapping Real-world Deployment of Future Internet Architectures

    Full text link
    The past decade has seen many proposals for future Internet architectures. Most of these proposals require substantial changes to the current networking infrastructure and end-user devices, resulting in a failure to move from theory to real-world deployment. This paper describes one possible strategy for bootstrapping the initial deployment of future Internet architectures by focusing on providing high availability as an incentive for early adopters. Through large-scale simulation and real-world implementation, we show that with only a small number of adopting ISPs, customers can obtain high availability guarantees. We discuss design, implementation, and evaluation of an availability device that allows customers to bridge into the future Internet architecture without modifications to their existing infrastructure

    Evidences Behind Skype Outage

    Get PDF
    Skype is one of the most successful VoIP application in the current Internet spectrum. One of the most peculiar characteristics of Skype is that it relies on a P2P infrastructure for the exchange of signaling information amongst active peers. During August 2007, an unexpected outage hit the Skype overlay, yielding to a service blackout that lasted for more than two days: this paper aims at throwing light to this event. Leveraging on the use of an accurate Skype classification engine, we carry on an experimental study of Skype signaling during the outage. In particular, we focus on the signaling traffic before, during and after the outage, in the attempt to quantify interesting properties of the event. While it is very difficult to gather clear insights concerning the root causes of the breakdown itself, the collected measurement allow nevertheless to quantify several interesting aspects of the outage: for instance, measurements show that the outage caused, on average, a 3-fold increase of signaling traffic and a 10-fold increase of number of contacted peers, topping to more than 11 million connections for the most active node in our network - which immediately gives the feeling of the extent of the phenomeno

    The use of simulation in the design of a road transport incident detection algorithm

    No full text
    Automatic incident detection is becoming one of the core tools of urban traffic management, enabling more rapid identification and response to traffic incidents and congestion. Existing traffic detection infrastructure within urban areas (often installed for traffic signal optimization) provides urban traffic control systems with a near continuous stream of data on the state of traffic within the network. The creation of a simulation to replicate such a data stream therefore provides a facility for the development of accurate congestion detection and warning algorithms. This paper describes firstly the augmentation of a commercial traffic model to provide an urban traffic control simulation platform and secondly the development of a new incident detection system (RAID-Remote Automatic Incident Detection), with the facility to use the simulation platform as an integral part of the design and calibration process. A brief description of a practical implementation of RAID is included along with summary evaluation results

    Poor Man's Content Centric Networking (with TCP)

    Get PDF
    A number of different architectures have been proposed in support of data-oriented or information-centric networking. Besides a similar visions, they share the need for designing a new networking architecture. We present an incrementally deployable approach to content-centric networking based upon TCP. Content-aware senders cooperate with probabilistically operating routers for scalable content delivery (to unmodified clients), effectively supporting opportunistic caching for time-shifted access as well as de-facto synchronous multicast delivery. Our approach is application protocol-independent and provides support beyond HTTP caching or managed CDNs. We present our protocol design along with a Linux-based implementation and some initial feasibility checks

    The effects of peer influence on adolescent pedestrian road-crossing decisions

    Get PDF
    Objective: Adolescence is a high-risk period for pedestrian injury. It is also a time of heightened susceptibility to peer influence. The aim of this research was to examine the effects of peer influence on the pedestrian road-crossing decisions of adolescents. Methods: Using 10 videos of road-crossing sites, 80 16- to 18-year-olds were asked to make pedestrian road-crossing decisions. Participants were assigned to one of 4 experimental conditions: negative peer (influencing unsafe decisions), positive peer (influencing cautious decisions), silent peer (who observed but did not comment), and no peer (the participant completed the task alone). Peers from the adolescent’s own friendship group were recruited to influence either an unsafe or a cautious decision. Results: Statistically significant differences were found between peer conditions. Participants least often identified safe road-crossing sites when accompanied by a negative peer and more frequently identified dangerous road-crossing sites when accompanied by a positive peer. Both cautious and unsafe comments from a peer influenced adolescent pedestrians’ decisions. Conclusions: These findings showed that road-crossing decisions of adolescents were influenced by both unsafe and cautious comments from their peers. The discussion highlighted the role that peers can play in both increasing and reducing adolescent risk-taking
    • …
    corecore