Skip to main content

Understanding IPv6 Usage: Communities and Behaviors

  • Conference paper
Challenges for Next Generation Network Operations and Service Management (APNOMS 2008)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5297))

Included in the following conference series:

  • 1104 Accesses

Abstract

The most important challenge faced by current IPv6 networks is to attract more users. Our data analysis of traces from exit points of CERNET2 shows that the traffic in this network has increased a lot during last five months. In this paper, we try to find the incentives of IPv6 users by identifying host communities and studying their properties. We reveal that popular services on CERNET2 are Web, FTP and VOD. FTP and VOD are the killer applications in terms of traffic volume while Web produces the largest number of flows. By analyzing behaviors of end hosts, we discover that hosts form many communities. These communities have different flow-level topologies and various interests in services. Using IPv6 prefixes assignment data, we perform demographic study of IPv6 usage. By presenting CERNET2 usage from various perspectives, we believe this study provides insight into further deployment of IPv6.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li, L., Alderson, D., Willinger, W., Doyle, J.: A first-principles approach to understanding the internet’s router-level topology. In: SIGCOMM 2004: Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 3–14. ACM Press, New York (2004)

    Chapter  Google Scholar 

  2. Reittu, H., Norros, I.: On the power-law random graph model of massive data networks. Perform. Eval. 55(1-2), 3–23 (2004)

    Article  Google Scholar 

  3. Crotti, M., Dusi, M., Gringoli, F., Salgarelli, L.: Traffic classification through simple statistical fingerprinting. SIGCOMM Comput.Commun.Rev. 37(1), 5–16 (2007)

    Article  Google Scholar 

  4. Xu, K., Zhang, Z.L., Bhattacharyya, S.: Profiling internet backbone traffic: behavior models and applications. In: SIGCOMM 2005: Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 169–180. ACM Press, New York (2005)

    Chapter  Google Scholar 

  5. Andrade, N., Mowbray, M., Lima, A., Wagner, G., Ripeanu, M.: Influences on cooperation in bittorrent communities. In: P2PECON 2005: Proceeding of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems, pp. 111–115. ACM, New York (2005)

    Chapter  Google Scholar 

  6. Karagiannis, T., Papagiannaki, K., Faloutsos, M.: Blinc: multilevel traffic classification in the dark. In: SIGCOMM 2005: Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 229–240. ACM Press, New York (2005)

    Chapter  Google Scholar 

  7. Bonfiglio, D., Mellia, P., Meo, M., Rossi, D., Tofanelli, P.: Revealing skype traffic: when randomness plays with you. In: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 37–48 (October 2007)

    Google Scholar 

  8. Yuan, L., Chuah, C.N., Mohapatra, P.: Progme: towards programmable network measurement. In: SIGCOMM 2007: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 97–108. ACM Press, New York (2007)

    Chapter  Google Scholar 

  9. Chen, Y., Tsai, F.S., Chan, K.L.: Blog search and mining in the business domain. In: DDDM 2007: Proceedings of the 2007 international workshop on Domain driven data mining, pp. 55–60. ACM, New York (2007)

    Chapter  Google Scholar 

  10. Qamra, A., Tseng, B., Chang, E.Y.: Mining blog stories using community-based and temporal clustering. In: CIKM 2006: Proceedings of the 15th ACM international conference on Information and knowledge management, pp. 58–67. ACM, New York (2006)

    Google Scholar 

  11. Gedeon, T., Parker, A.E., Campion, C., Aldworth, Z.: Annealing and the normalized n-cut. Pattern Recogn. 41(2), 592–606 (2008)

    Article  MATH  Google Scholar 

  12. Scripps, J., Tan, P.N., Esfahanian, A.H.: Node roles and community structure in networks. In: WebKDD/SNA-KDD 2007: Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis, pp. 26–35. ACM Press, New York (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Huang, S., An, C., Wang, H., Yang, J. (2008). Understanding IPv6 Usage: Communities and Behaviors. In: Ma, Y., Choi, D., Ata, S. (eds) Challenges for Next Generation Network Operations and Service Management. APNOMS 2008. Lecture Notes in Computer Science, vol 5297. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88623-5_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-88623-5_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-88622-8

  • Online ISBN: 978-3-540-88623-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics