Abstract
For network monitoring, management and operations it is important to understand the nature of the network traffic flowing at a point in the network. Torrent, the set of all flows on a network link and s-torrents, logical sets of flows of network traffic are very useful in this context. However detecting and measuring torrent and the constituent s-torrents automatically is a challenge. In this work we describe a novel method to detect and measure torrents. We show the usefulness of the method in obtaining a more effective and deeper insight into the network’s behavior and utilization.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
B. Ryu, D. Cheney, and H-W. Braun, “Internet Flow Characterization-Adaptive Timeout and Statistical Modeling,” PAM2001 workshop paper.
B. Krishnamurthy, and J. Wang, “On network-aware clustering of web clients,” In Proceedings of ACM SIGCOMM’ 00, August 2000.
D.D. Clark, “Policy routing in Internet protocols,” RFC1102, IETF, 1989.
K. Cho, K. Mitsuya, and A. Kato, “Traffic data repository at the WIDE project,” In USENIX 2000 Annual Technical Conference: FREENIX Track, page 263–270, June 2000.
K. Cho, R. Kaizaki, and A. Kato, “Aguri:An Aggregation-based Traffic Profiler,” In Proceedings of QofIS2001 (published by Springer-Verlag in the LCNS series). September 2001.
K.C. Claffy, H-W. Braun, and G.C. Polyzos, “A parameterizable methodology for Internet traffic flow profiling,” IEEE Journal of Selected Areas in Communications, 13(8):1481–1494,1995.
N. Brownlee, “Using NeTraMet for Production Traffic Measurement,” Intelligent Management Conference(IM2001), May 2001.
N. Brownlee, C. Mills, and G. Ruth, “Traffic flow measurement: Architecture,” RFC 2722, IETF, October 1999.
N. Brownlee, and M. Murray, “Streams,Flows and Torrents,” In PAM 2001.
S. Waldbusser, “Remote Network Monitoring Management Information Base,” RFC 1271, IETF, November 1991.
T. Bates, E. Gerich, L. Joncheray, J-M. Jouanigot, D. Karrenberg, M. Terpstra, and J. Yu, “Representation of IP Routing Policies in a Routing Registry(ripe-81++),” RFC 1786, IETF, 1995.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kazuhide, K., Mansfield Keeni, G., Norio, S. (2002). In Search of Torrents: Automatic Detection of Logical Sets Flows in Network Traffic. In: Bhalla, S. (eds) Databases in Networked Information Systems. DNIS 2002. Lecture Notes in Computer Science, vol 2544. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36233-9_19
Download citation
DOI: https://doi.org/10.1007/3-540-36233-9_19
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00264-2
Online ISBN: 978-3-540-36233-3
eBook Packages: Springer Book Archive