Understanding IPv6 Usage: Communities and Behaviors
The most important challenge faced by current IPv6 networks is to attract more users. Our data analysis of traces from exit points of CERNET2 shows that the traffic in this network has increased a lot during last five months. In this paper, we try to find the incentives of IPv6 users by identifying host communities and studying their properties. We reveal that popular services on CERNET2 are Web, FTP and VOD. FTP and VOD are the killer applications in terms of traffic volume while Web produces the largest number of flows. By analyzing behaviors of end hosts, we discover that hosts form many communities. These communities have different flow-level topologies and various interests in services. Using IPv6 prefixes assignment data, we perform demographic study of IPv6 usage. By presenting CERNET2 usage from various perspectives, we believe this study provides insight into further deployment of IPv6.
KeywordsHost Community Port Number Demographic Study Community Interest Star Topology
Unable to display preview. Download preview PDF.
- 1.Li, L., Alderson, D., Willinger, W., Doyle, J.: A first-principles approach to understanding the internet’s router-level topology. In: SIGCOMM 2004: Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 3–14. ACM Press, New York (2004)CrossRefGoogle Scholar
- 4.Xu, K., Zhang, Z.L., Bhattacharyya, S.: Profiling internet backbone traffic: behavior models and applications. In: SIGCOMM 2005: Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 169–180. ACM Press, New York (2005)CrossRefGoogle Scholar
- 6.Karagiannis, T., Papagiannaki, K., Faloutsos, M.: Blinc: multilevel traffic classification in the dark. In: SIGCOMM 2005: Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 229–240. ACM Press, New York (2005)CrossRefGoogle Scholar
- 7.Bonfiglio, D., Mellia, P., Meo, M., Rossi, D., Tofanelli, P.: Revealing skype traffic: when randomness plays with you. In: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 37–48 (October 2007)Google Scholar
- 10.Qamra, A., Tseng, B., Chang, E.Y.: Mining blog stories using community-based and temporal clustering. In: CIKM 2006: Proceedings of the 15th ACM international conference on Information and knowledge management, pp. 58–67. ACM, New York (2006)Google Scholar
- 12.Scripps, J., Tan, P.N., Esfahanian, A.H.: Node roles and community structure in networks. In: WebKDD/SNA-KDD 2007: Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis, pp. 26–35. ACM Press, New York (2007)Google Scholar