Advertisement

Understanding IPv6 Usage: Communities and Behaviors

  • Shaojun Huang
  • Changqing An
  • Hui Wang
  • Jiahai Yang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5297)

Abstract

The most important challenge faced by current IPv6 networks is to attract more users. Our data analysis of traces from exit points of CERNET2 shows that the traffic in this network has increased a lot during last five months. In this paper, we try to find the incentives of IPv6 users by identifying host communities and studying their properties. We reveal that popular services on CERNET2 are Web, FTP and VOD. FTP and VOD are the killer applications in terms of traffic volume while Web produces the largest number of flows. By analyzing behaviors of end hosts, we discover that hosts form many communities. These communities have different flow-level topologies and various interests in services. Using IPv6 prefixes assignment data, we perform demographic study of IPv6 usage. By presenting CERNET2 usage from various perspectives, we believe this study provides insight into further deployment of IPv6.

Keywords

Host Community Port Number Demographic Study Community Interest Star Topology 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Li, L., Alderson, D., Willinger, W., Doyle, J.: A first-principles approach to understanding the internet’s router-level topology. In: SIGCOMM 2004: Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 3–14. ACM Press, New York (2004)CrossRefGoogle Scholar
  2. 2.
    Reittu, H., Norros, I.: On the power-law random graph model of massive data networks. Perform. Eval. 55(1-2), 3–23 (2004)CrossRefGoogle Scholar
  3. 3.
    Crotti, M., Dusi, M., Gringoli, F., Salgarelli, L.: Traffic classification through simple statistical fingerprinting. SIGCOMM Comput.Commun.Rev. 37(1), 5–16 (2007)CrossRefGoogle Scholar
  4. 4.
    Xu, K., Zhang, Z.L., Bhattacharyya, S.: Profiling internet backbone traffic: behavior models and applications. In: SIGCOMM 2005: Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 169–180. ACM Press, New York (2005)CrossRefGoogle Scholar
  5. 5.
    Andrade, N., Mowbray, M., Lima, A., Wagner, G., Ripeanu, M.: Influences on cooperation in bittorrent communities. In: P2PECON 2005: Proceeding of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems, pp. 111–115. ACM, New York (2005)CrossRefGoogle Scholar
  6. 6.
    Karagiannis, T., Papagiannaki, K., Faloutsos, M.: Blinc: multilevel traffic classification in the dark. In: SIGCOMM 2005: Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 229–240. ACM Press, New York (2005)CrossRefGoogle Scholar
  7. 7.
    Bonfiglio, D., Mellia, P., Meo, M., Rossi, D., Tofanelli, P.: Revealing skype traffic: when randomness plays with you. In: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 37–48 (October 2007)Google Scholar
  8. 8.
    Yuan, L., Chuah, C.N., Mohapatra, P.: Progme: towards programmable network measurement. In: SIGCOMM 2007: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 97–108. ACM Press, New York (2007)CrossRefGoogle Scholar
  9. 9.
    Chen, Y., Tsai, F.S., Chan, K.L.: Blog search and mining in the business domain. In: DDDM 2007: Proceedings of the 2007 international workshop on Domain driven data mining, pp. 55–60. ACM, New York (2007)CrossRefGoogle Scholar
  10. 10.
    Qamra, A., Tseng, B., Chang, E.Y.: Mining blog stories using community-based and temporal clustering. In: CIKM 2006: Proceedings of the 15th ACM international conference on Information and knowledge management, pp. 58–67. ACM, New York (2006)Google Scholar
  11. 11.
    Gedeon, T., Parker, A.E., Campion, C., Aldworth, Z.: Annealing and the normalized n-cut. Pattern Recogn. 41(2), 592–606 (2008)CrossRefzbMATHGoogle Scholar
  12. 12.
    Scripps, J., Tan, P.N., Esfahanian, A.H.: Node roles and community structure in networks. In: WebKDD/SNA-KDD 2007: Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis, pp. 26–35. ACM Press, New York (2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Shaojun Huang
    • 1
  • Changqing An
    • 2
  • Hui Wang
    • 2
  • Jiahai Yang
    • 2
  1. 1.Network Research CenterTsinghua UnivBeijingChina
  2. 2.Tsinghua National Laboratory for Information Science and TechnologyChina

Personalised recommendations