Dataset Viewer
arxiv_id
stringlengths 9
15
| arxiv_category
stringclasses 5
values | category
stringclasses 2
values | text
stringlengths 0
1.19M
|
|---|---|---|---|
0705.0815
|
cs.NI
|
cyber
|
# Netsukuku
Close the world,
Open the next
http://netsukuku.freaknet.org
###### Abstract
Netsukuku is a P2P network system designed to handle a large number of nodes with minimal CPU and memory resources. It can be easily used to build a worldwide distributed, anonymous and not controlled network, separated from the Internet, without the support of any servers, ISPs or authority controls.
In this document, we give a generic and non technical description of the Netsukuku network, emphasizing its main ideas and features.
## 1 The old wired
The Internet is a hierarchic network managed by multinational companies and organisations supported by governments. Each bit of Internet traffic passes through proprietary backbones and routers.
The Internet Service Providers give the connectivity to all the users, who are in the lowest rank of this hierarchic pyramid. For this reason, the Internet is not a global network created by the users and shared between them. The people can join the Net only in accordance with the restrictive conditions and terms imposed by the Majors.
The Internet represents, today, the means to access information, knowledge and communication. About 1 billion of people can connect to this great proprietary network, but the remaining 5 billion of people, which don’t have enough economic resource, are still waiting the multinationals to supply a service within their reach.
The Internet was born with the intent of warranting a secure and unattackable communication between the various nodes of the network, but now, paradoxically, an ISP has the power to cut out of the Internet entire nations by simply stopping to give its services.
Beside that, Internet is not anonymous: the ISP can trace back and analyse the traffic of data going through their servers, without any limits.
The centralised and hierarchical structure of the Internet creates, as a consequence, other identical systems, based on it, i.e. the DNS. The servers of the Domain Name System are managed by different ISPs, as well and the domains are literally sold through a similar centralised system. This kind of structures allows, in a very simple and efficient way, to physically localise any computers, which are connected to the Internet, in a very short time and without any particular efforts.
In China, the whole net is constantly watched by several computers filtering the Internet traffic: a Chinese will never be able to see or came to know about a site containing some keywords, such as “democracy”, censored by the government. He’ll never be able to express his own ideas on the net, e.g. about his government’s policy, without risking till the death penalty.
Internet was born to satisfy the military needs of security for the administration of the American defence, not to ensure freedom of communication and information: in order to communicate between each other the Internet users are obliged to submit themselves to the control and to the support of big multinationals, whose only aim is to expand their own hegemony.
As long as all the efforts to bring more freedom, privacy and accessibility in the Internet face aversions, fears, contrary interests of governments and private companies, the very alternative solution to this problem is to let the users migrate toward a distributed, decentralised and fully efficient net, in which all the users interact at the same level, with no privilege and no conditioning means, as authentic citizens of a free world wide community.
## 2 The Netsukuku wired
Netsukuku is a mesh network or a p2p net system that generates and sustains itself autonomously. It is designed to handle an unlimited number of nodes with minimal CPU and memory resources. Thanks to this feature it can be easily used to build a worldwide distributed, anonymous and not controlled network, separated from the Internet, without the support of any servers, ISPs or control authorities.
This net is composed by computers linked physically each other, therefore it isn’t build upon any existing network. Netsukuku builds only the routes which connects all the computers of the net.
In other words, Netsukuku replaces the level 3 of the model iso/osi with another routing protocol.
Being Netsukuku a distributed and decentralised net, it is possible to implement real distributed systems on it, e.g. the Abnormal Netsukuku Domain Name Anarchy (ANDNA)\[[4](#bib.bib4)\] which will replace the actual hierarchic and centralised system of DNS.
### 2.1 Gandhi
The main characteristic of Netsukuku is its self-management: the network dynamically configures itself without any external interventions. All the nodes share the same privileges and limitations, giving their contribution to sustain and expand Netsukuku. The more the nodes increase in number the more the net grows and becomes efficient.
The total decentralisation and distribution allows Netsukuku to be neither controlled nor destroyed: the only way to manipulate or demolish it, is to knock physically down each single node composing the network.
### 2.2 No name, no identity
Inside Netsukuku everyone, in any place, at any moment, can hook immediately to the net without coming trough any bureaucratic or legal compliance.
Every elements of the net is extremely dynamic and it’s never the same. The IP address identifying a computer is chosen randomly, therefore it’s extremely difficult to associate it to a particular physical place; furthermore since the routes are composed by a huge number of nodes, it becomes a titanic task to trace a specific node.
The traffic of the nodes is protected by a complete cryptographic layer\[[5](#bib.bib5)\], which ensures a strong anonymity and security.
### 2.3 So, what is it?
Netsukuku is a mesh network built on top of its own dynamic routing protocol.
Currently there are a wide number of dynamic routing protocols, but they are solely utilised to create small and medium nets. The routers of Internet are also managed by different protocols such as the OSPF, the RIP, or the BGP. They are based on different classical graph algorithms, which are able to find out the best path to reach a node in a given graph. However, all these protocols require a very high waste of CPU and memory. Indeed, the Internet routers are computers specifically dedicated to the executions of these algorithms. It would be impossible to implement one of these protocols to create a maintain a mesh network large as the whole Internet.
The Netsukuku protocol structures the entire net as a fractal\[[3](#bib.bib3)\] and, in order to calculate all the needed routes it makes use of a particular algorithm called Quantum Shortest Path Netsukuku (QSPN)\[[2](#bib.bib2)\].
A fractal is a structure which can be compressed infinitely, because every part of itself is composed by the same fractal. Thus its high compression level gives the ability to store the whole Netsukuku map in just few Kilobytes.
On the other hand, the QSPN is an algorithm that has to be executed by the network itself. The nodes, in order to execute it, have just to send and receive the Tracer Packets, without using heavy computational resources.
### 2.4 Netsukuku the wireless
The best medium to establish physical connections between nodes is the wifi. When Netsukuku will be widely adopted, its users will have just to set up their own wifi antennas on a well exposed place (i.e. windows or roofs), linking themselves to the other Netsukuku users, placed within their radio ranges. Nowadays, there is a great variety of wifi technologies which allow to link two nodes distant kilometres each other. A whole city can be easily covered by placing just one node in each neighbourhood.
Moreover, it is possible to use virtual tunnels over the Internet to temporarily replace missing physical links. This subject is described in \[[6](#bib.bib6)\].
## References
- \[1\] Netsukuku website: http://netsukuku.freaknet.org/
- \[2\] QSPN document: http://netsukuku.freaknet.org/doc/main_doc/qspn.pdf
- \[3\] Netsukuku topology document: http://netsukuku.freaknet.org/doc/main_doc/topology.pdf
- \[4\] ANDNA document: http://netsukuku.freaknet.org/doc/main_doc/andna.pdf
- \[5\] Carciofo NTK_RFC: http://lab.dyne.org/Ntk_carciofo
- \[6\] Internet and Netsukuku: http://netsukuku.freaknet.org/doc/main_doc/inetntk.pdf
`^_^`
|
0705.2786
|
cs.OS
|
cyber
|
<sup>1</sup>
<sup>1</sup>institutetext: Faculty of Mathematics, Physics and Chemistry, Silesian University, Bankowa 14, 40-007 Katowice, Poland. Email:
<sup>1</sup>
<sup>1</sup>email: jjw@us.edu.pl
# Virtualization: A double-edged sword
Joachim J. Włodarz
###### Abstract
Virtualization became recently a hot topic once again, after being dormant for more than twenty years. In the meantime, it has been almost forgotten, that virtual machines are not so perfect isolating environments as it seems, when looking at the principles. These lessons were already learnt earlier when the first virtualized systems have been exposed to real life usage. Contemporary virtualization software enables instant creation and destruction of virtual machines on a host, live migration from one host to another, execution history manipulation, etc. These features are very useful in practice, but also causing headaches among security specialists, especially in current hostile network environments. In the present contribution we discuss the principles, potential benefits and risks of virtualization in a déjà vu perspective, related to previous experiences with virtualization in the mainframe era.
## 1 Introduction
Recently, a vigorous interest in various virtualization techniques has been observed. Rather than being only a buzzword, virtualization became since 2005 a main direction in the evolution of the whole IT market. According to recent predictions by the Gartner Group, operating system virtualization and I/O virtualization will become mainstream by 2010 \[[1](#bib.bib1)\].
Traditionally, the leadership in providing virtualization based solutions belonged to IBM, beginning with the VM/370 operating system for System/370 mainframes introduced in 1972 \[[2](#bib.bib2)\]. With the advent of relatively cheap microprocessor based computers within the next decade, the IT industry shifted their interests to personal computing, based on individual hardware computers rather than some virtual machines. But at the beginning of the 21st century, most personal workstations and low-end servers became powerful enough to carry multiple operating systems running concurrently on the same hardware, which rised the interests in virtualization once again, this time on the commodity x86 platform. Moreover, it turned out from experience that setting up an extensive IT infrastructure with a lot of dedicated hardware put together with the appropriate, also dedicated software, is highly inefficient and also very expensive in management. Virtualization, leading generally to decoupling of software from the underlying hardware, seems to have the potential for substantial improvements in such situations.
In the meantime, virtualization software and virtualized systems became already a target of new security threats, with possibly disastrous consequences. In contrary to the widespread belief that, e.g., virtual machines should be way more secure than their physical equivalents, virtualized computer systems may be sometimes less secure and even create new security challenges.
In the present contribution we discuss the benefits as well as the risks and problems of employing virtualization based IT solutions. The discussion is undoubtedly biased due to the authors’ experiences with virtualization, first on various IBM mainframes many years ago and more recently also on the x86 platform, where many problems appeared as déjà vu. As already emphasized in the title, virtualization is like a double-edged sword: a powerful weapon, but also quite dangerous for the warrior.
## 2 Background
When browsing through the literature, one could find several definitions for virtualization, depending on the particular subject and its context. Generally, virtualization creates new entities in a computer system which are substitutes for the real ones, with the same functionality, interfaces and behavior, except the timings which are usually different. The virtual resources, created through such a substitution process, have to be eventually mapped to appropriate real resources, possibly going through more than one level of indirection, if necessary.
The first and also the most important concept of a virtual entity in computer systems was virtual memory, introduced and developed around 1956 by Fritz-Rudolf Güntsch \[[4](#bib.bib4)\] to unify various kinds of memory devices within an experimental computer system built at TU Berlin. A couple of years later the first commercial computer with memory virtualization onboard was already built: the famous Atlas Computer \[[5](#bib.bib5)\] developed at the University of Manchester with collaboration of Ferranti/ICL. Although influential, the Atlas computer was known not to be working well in practical environments, mostly due to limited performance of the hardware available at this time.
A more systematic approach to virtualization has been taken by IBM engineers working on the System/360, the first computer family ”architected” according to common, precisely defined principles of operation. In order to develop an interactive, multi-user system based on the already existing S/360 operating systems, facilitate time-sharing and at the same time also protect the users from each other, they decided to provide each user with a dedicated ”pseudo-machine”, a fake System/360 computer capable to run any other S/360 operating system. The term ”pseudo-machine” has been renamed soon to ”virtual machine”, when it turned out that the latter term has been already used earlier at IBM Research for an M44/44x experimental system, aimed at providing partially virtualized “7044-like” virtual machines on a modified IBM 7044 36-bit mainframe \[[6](#bib.bib6)\].
The intended full hardware virtualization per time-sharing user was quite demanding and needed an appropriate support from the hardware itself to run with acceptable performance. Such hardware support appeared in only one System/360 computer: the famous System/360 Model 67. Regular hardware support for virtualization became reality a couple of years later, within the System/370 family and not without exercising some pressure from the “VM community” inside and outside IBM \[[7](#bib.bib7)\]. The first officially released version of VM/370 was able to provide an exact functional copy of the underlying System/370 hardware, according to the virtual machine configuration defined in the system directory. A particular user could even run another copy of VM/370 on the virtual hardware, e.g., to test a new version of system software without disrupting the running system.
The architecture of a “classical” VM/370 system, nowadays known rather as hypervisor Type I architecture according to a widely accepted classification, introduced by Robert P. Goldberg in his PhD thesis \[[8](#bib.bib8)\], is sketched in Fig.[1](#S2.F1 "Figure 1 ‣ 2 Background ‣ Virtualization: A double-edged sword") below.
[Refer to caption](/html/0705.2786/assets/x1.png)
Figure 1: The “classical” VM/370 hypervisor (Type I)
The VM/370 hypervisor, or Control Program (CP) in the original IBM terminology, represents here the software layer implementing the virtual machines, each having exactly the same instruction set architecture (ISA) as the underlying System/370 hardware. This approach enabled a peaceful coexistence of several operating systems with different needs and applications, running in parallel on the same hardware machine. In the example presented in Fig.[1](#S2.F1 "Figure 1 ‣ 2 Background ‣ Virtualization: A double-edged sword"), one virtual machine runs CMS, a simple operating system intended for individual usage, side-by-side with the mammoth-size MVS, a general purpose multitasking and multiuser operating system and even a second-level VM/370, running concurrently with its own virtual machines. A direct communication with the hypervisor was possible, and sometimes also necessary, through the built-in CP command interface set up for each virtual machine according to the assigned priviledge level. The seemingly perfectly isolated virtual machines, running under the VM/370 hypervisor with carefully assigned priviledges, proved in practice to be totally insecure for intended intrusions, enabling even a total system penetration from a running VM, with direct access to the real hardware and in the real supervisor state \[[9](#bib.bib9)\].
Virtual computer systems could be also created via emulation, where appropriate software imitates another computer system or its part, e.g. CPU. In principle, any operating environment could be emulated within another operating environment, including exact copy of the hardware used by the operating system executing the emulator software itself. Emulators were originally intended to permit the execution of programs written for another computer \[[10](#bib.bib10)\], i.e. for another ISA than employed on the host computer system, but there is certainly nothing wrong with emulation of the same ISA and the related I/O hardware, giving effectively another kind of hypervisor: the so called Type II hypervisor \[[8](#bib.bib8)\].
Emulators and Type II hypervisors may run as ordinary applications within the host computer operating system, being totally decoupled from the real hardware. Although it may be desirable e.g. for debugging purposes, it means usually a very slow execution within the virtual machine. A considerable speedup could be provided by the help of real hardware, made available in parallel to the operating system services, usually through a specialized “Hybrid Virtualization” host operating system driver, see the sketch in Fig.[2](#S2.F2 "Figure 2 ‣ 2 Background ‣ Virtualization: A double-edged sword").
[Refer to caption](/html/0705.2786/assets/x2.png)
Figure 2: A Type II hypervisor
Yet another approach to virtualization, a so called container-based virtualization, is based on the mechanisms employed by contemporary operating systems to establish a stardard execution environment for processes: the “process virtual machine”. Augmented with mechanisms for hiding and/or rewriting system-level data, the operating system kernel itself could be used as a kind of “hypervisor” to confine the processes within well-separated “execution containers”. As shown in Fig.[3](#S2.F3 "Figure 3 ‣ 2 Background ‣ Virtualization: A double-edged sword"), the virtualized system contains in this case a fully priviledged “Host VM” used mainly for system management and several “Guest VMs”, which are seemingly equivalent to separate hosts.
[Refer to caption](/html/0705.2786/assets/x3.png)
Figure 3: Container-based operating system level virtualization
The main advantage of container-based virtualization is high performance and scalability with only a minimal overhead introduced through the virtualization. Many contemporary operating systems offer this possibility as a built-in or addon feature, e.g., Zones/BrandZ in Solaris, Secure Resource Partitions in HP-UX or VServer and OpenVZ/Virtuozzo for Linux.
## 3 x86 Virtualization
The constantly increasing performance of x86-based computers within the last decade rised also the interest in virtualization on this platform. The Intel Pentium “classical” IA-32 architecture has beed designed rather to remain compatible with previous Intel processors than being virtualizable, with exception of the “virtual 86” sub-mode intended for running “Multiple Virtual DOS Machines” in protected mode. Therefore, it is quite challenging to implement virtualization software on this platform (cf. \[[11](#bib.bib11), [12](#bib.bib12)\] and references therein).
Due to the recent high demand for virtualization, the newest Intel and AMD processors include a series of architectural extensions providing hardware support for full virtualization, which simplifies also considerably the implementation of x86-based “true” hypervisors (cf.\[[13](#bib.bib13), [14](#bib.bib14)\]).
The most hardware independent way of virtualization is pure emulation, where no instructions are being passed directly to the host hardware. Several emulators exists for the x86 platform, the most advanced: Bochs \[[15](#bib.bib15)\] and QEMU \[[16](#bib.bib16)\] are available for many host platforms, including x86 itself. QEMU enhanced with kqemu module (a HV driver) works efectively as a Type II hypervisor with almost native speed. The Kernel-based Virtual Machine, available with recent Linux kernels, provides full virtualization support with QEMU user-level frontend \[[17](#bib.bib17)\].
VMware Inc. \[[18](#bib.bib18)\], a pioneer of virtualization on the x86 platform, offers since 1999 a whole line of proprietary x86 virtualization software. The lowest-level products for workstations (VMware Player) and servers (VMware Server, earlier known as GSX Server) are available as freeware for MS Windows and also Linux. Similar virtualization products are offered also by Microsoft: Virtual PC and Virtual Server, which became also freely available last year as direct competitors to VMware products on the MS Windows platform.
The Xen hypervisor, developed initially as research project at the University of Cambridge \[[19](#bib.bib19)\], seems to be the most promising and dynamically evolving open-source virtualization software. Working generally as a Type I hypervisor, Xen provides paravirtualized hardware for its virtual machines when full virtualization is not possible, e.g. when working on a Pentium host.
Paravirtualization enables a cooperation between the guest operating system and the hypervisor to circumvent virtualization problems and increase performance. The operating systems intended for the paravirtualized Xen virtual machines have to be ported to the Xen architecture, which may become problematic in case of proprietary operating systems. On the other hand, paravirtualized operating systems could perform even better than their native versions running directly on the host hardware, because the hypervisor may e.g. warrant apropriate resource allocations \[[20](#bib.bib20)\].
Virtual machines established under the Xen 3 hypervisor may be “live migrated” to another Xen 3 host computer, with only a very short application-level downtime around 100-300 ms in a local network with available network storage \[[21](#bib.bib21)\]. It has been demonstrated recently, that a long-haul live migration is fairly possible even at a planetary level, with downtimes rising only to 1-2 seconds for the distance between Amsterdam and San Diego \[[22](#bib.bib22)\].
## 4 Applications and Benefits
Virtualization technologies can be used for many purposes. In the mainframe era the virtualized resources were localized on a single host computer and accesible only to a relatively small number of users. Today, the possibility of migration of virtual machines from host to host, even in a “live” state, makes a tremendous difference. A virtual machine could be instantly created on some host, then moved elsewhere, e.g., when the host becomes overloaded, or completely destroyed if not needed. With a proper configuration, virtualized environments exhibit a sound level of isolation from each other, hence a crash occuring in one environment should remain unnoticed outside, which is a desired property for testbeds and security systems.
### 4.1 Hardware Replacement
Virtual hardware may easily replace real hardware consuming precious datacenter resouces like floor space, electricity or manpower. This is especially important for sites running older equipment, which may be not easy to maintain, and at some point become even impossible to run, e.g., due to the lack of appropriate spare parts on the market. Virtualization is often used for server consolidation, i.e. a reduction of the total number of servers or even separate datacenters to a required minimum. At the same time, software which became incompatible with the new hardware and/or its configuration could be deployed within specialized virtual machines when needed, e.g., for archival purposes. The possibility to migrate “live machines” across networks gives additional flexibility in load balancing and disaster recovery, enabling seamless movement of workloads between distant datacenters practically without downtimes.
### 4.2 Testing and Debugging
Many virtualization systems, particularily emulators, were invented for testing and debugging purposes, especially in the operating system kernel development, where the experimental system have to be rebooted again and again. Also, getting some data for debugging may be not easy on a real hardware, requiring sometimes arcane equipment. On emulated hardware, the same task could be a trivial recording to some log file. With appropriate builtin hooks, any virtualization environment may serve as a powerful debugger, with possibility of a “time travel”, i.e. arbitrary navigation in the execution history \[[23](#bib.bib23)\].
### 4.3 Education and E-Learning
Virtual hardware is a very attractive possibility to have handy in any educational computer laboratory, because the students may experiment with various operating systems and network setups, without fighting with problems related to running a multiplatform laboratory based on real hardware \[[24](#bib.bib24)\]. For e-Learning purposes, such a “virtual laboratory” could be made accesible remotely, e.g. from a standard web browser \[[25](#bib.bib25)\].
### 4.4 Security Systems
The isolation of applications running within a standard operating system is usually based only of the process abstraction, with many facilities available for data sharing, also in a system-wide manner. Virtual machine technology may be therefore used to additionally isolate sensitive environments and minimize the risk of compromising the entire system due to problems in one of the environments.
Network services are usually regarded as particularily sensitive to security problems, related to the direct contact with the possible hostile network surrounding. Therefore, a separate network frontend virtual machine could be added to a virtualized system to handle the network connections and redirect them appropriately. With intelligent network hardware dedicated to this virtual machine and a minimal hardened operating system with integrated firewall, e.g. OpenBSD with pf, the overhead should be negigible \[[26](#bib.bib26)\].
Much more demanding would be a virtual secure file server, established to enforce a directory and file access control policy, even if the main system become compromised \[[27](#bib.bib27)\]. It has been recently demonstrated that a more elaborated configuration, with several dedicated virtual machines and checkpointing, allows for an almost instant, automatical recovery after intrusion detection \[[28](#bib.bib28)\].
## 5 The Other Edge of Virtualization
Even in the mainframe era virtual machines were considered not secure enough for hosting sensitive data, mainly due to the I/O handling in VM/370 \[[9](#bib.bib9)\]. It turned out that a “hardening” by closing known security holes does not guarantee the absence of other security flaws in the hardened system, therefore a “security retrofit program” has been started to design a formally verified “security kernel” for VM/370 \[[29](#bib.bib29)\].
There is no doubt that many hypervisors proliferating nowadays on the x86 platform need much more than only closing the detected security holes on the fly. Without similar, specific “security retrofit” programs it would be pretty hard to avoid security problems. As shown in a very recent study by Tavis Ormandy \[[30](#bib.bib30)\], the present state of security exposure from implementation flaws in popular virtualization software is quite alarming. With exception of Xen, all tested packages contained exploitable security flaws, allowing a potential attacker to escape reliably from the confining virtual machine.
The mobility of virtual machines, which could be easily migrated along multiple domains, adds its own vulnerabilities. E.g., a virtual machine may be moved into a faked recipient host (“kidnapped”) or compromised while stored semewhere in transit. The ease of manipulations involving virtual machines, which may be created on the fly, possibly immitating another virtual/physical machine, then (mis)used for some purpose, and subsequently destroyed or moved away could be also a source of many security problems, unknown when working on dedicated hardware computers. Static security arrangements are rather useless in this context.
As demonstrated recently \[[31](#bib.bib31)\], it is perfectly possible to hide malware in a virtual machine running in parallel or force the host operating system into a virtual machine, keeping the malware running outside. With latest hardware enhancements for virtualization, it is also possible to do that on the fly, without disrupting the running operating system \[[32](#bib.bib32), [33](#bib.bib33)\].
## 6 Conclusions
When properly prepared and properly done, virtualization offers many benefits in comparison with equivalent, contemporary available hardware based solutions. In the next few years virtualization will become a standard way of computing in the enterprise, academia and personal use of computers due to substantial savings and enormous flexibility.
The installation of operating systems and applications will quickly become obsolete due to the possibility of preparation and distribution of virtual appliances, tailored to the needs and ready to run on any computer with the right hypervisor onboard.
When using virtualization for security, a security enhanced implementation with multilevel security \[[34](#bib.bib34)\] would be definitely recommended. A secure hypervisor architecture, sHype developed at IBM \[[35](#bib.bib35)\], targeted at the Common Criteria EAL4 assurance level, is now a part of the Xen open-source hypervisor \[[36](#bib.bib36)\]. There are plans \[[37](#bib.bib37)\] for further elevation of the Xen assurance level at EAL5 and then EAL6. A prototype system for enforcing mandatory access control policies across a distributed set of virtual machines has been also tested recently with the Xen hypervisor \[[38](#bib.bib38)\]. Therefore Xen seems to be now the most advanced hypervisor with a proven track record and clear evolution path in virtualization security.
Last but not least, virtual machines are in principle nothing more than big fat programs with a complex inner life, executed on a usually thin hypervisor layer, which in turn is in principle nothing more than a specialized operating system. Looking from this perspective, there is no doubt, that virtualization software have to be always kept up-to-date and possibly equipped with a proper security add-on, exactly like ordinary operating systems. And the virtual appliances/machines have to be treated like ordinary executables, which are potentially corrupted, infected or malicious.
## References
- \[1\]
Enck, J., Dawson, P., Phelps, J.R.: Predicts 2007: Brace Yourself for the Next Wave of Server Technology. Gartner RAS Core Research Note G00143973, 8 November 2006.
- \[2\]
Creasy, R.J.: The origin of the VM/370 time-sharing system. IBM J. Res. Dev. 25:483–490, 1981.
- \[3\]
MacDonald, N.: Securing Virtualization and Virtualizing Security. ITxpo 2007, San Francisco CA, 22–26 April 2007.
- \[4\]
Jessen, E.: Die Entwicklung des virtuellen Speichers. Informatik Spektrum 19:216–219, 1996.
- \[5\]
Sumner, F.H.: The Atlas Computer. In: The First Computers: History and Architectures. , edited by R. Rojas and U. Hashagen, MIT Press, 2000. (ISBN 0-262-18197-5)
- \[6\]
Parmelee, R.P., Peterson, T.I., Tillman, C.C. and Hatfield, D.J.: Virtual storage and virtual machine concepts. IBM Systems J. 11:99–130, 1972.
- \[7\]
Varian, M.: VM and the VM Community: Past, Present, and Future. SHARE 89, August 1997.
- \[8\]
Goldberg, R.P.: Architectural Principles for Virtual Computer Systems. Division of Engineering and Applied Physics, Harvard Univ., Cambridge Mass., 1972. (PhD Thesis)
- \[9\]
Attanasio, C.R., Markstein, P.W. and Philipps, R.J.: Penetrating an Operating System: A Study of VM/370 integrity. IBM Systems J. 15:102–116, 1976.
- \[10\]
Mallach, E.G.: Emulation: A Survey. Honeywell Comp. J. 6:287–297, 1972.
- \[11\]
Robin, J.S., Irvine, C.E: Analysis of the Intel Pentium’s Ability to Support a Secure Virtual Machine Monitor. In: Proc. of the Ninth USENIX Security Symposium, Denver CO, Aug. 14-17, 2000.
- \[12\]
Adams, K., Agesen, O.: A Comparison of Software and Hardware Techniques for x86 Virtualization. Operating Systems Rev. 40(5):2–13, 2006.
- \[13\]
Intel: Intel Virtualization Technology. Intel Technology Journal 10(3) 2006. (whole issue)
- \[14\]
AMD: SVM Architecture Reference Manual. AMD 2005.
- \[15\]
The Bochs Project: Bochs: The Open Source IA-32 Emulation Project. http://bochs.sourceforge.net
- \[16\]
Bellard, F.: QEMU. http://www.qemu.org
- \[17\]
Qumranet: KVM Whitepaper. Qumranet 2006.
- \[18\]
VMware: VMware: Virtualization, Virtual Machine and Virtual Server Consolidation. http://www.vmware.com
- \[19\]
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Pratt, I., Warfield, A., and Neugebauer, R.: Xen and The Art of Virtualization. In: Proc. of the ACM Symposium on Operating System Principles, 2003.
- \[20\]
Mergen, M.F., Uhlig, V., Krieger, O. and Xenidis, J.: Virtualization for High-Performance Computing. Operating Systems Review 40(2):8–11, 2006.
- \[21\]
Clark, C., Fraser, K., Hand, S., Hansen, J.G., Jul, E., Limpach, Ch., Pratt, I., and Warfield, A.: Live Migration of Virtual Machines. In: 2nd Symp. on Networked System Design and Implementation, 2005.
- \[22\]
Travostino, F., Daspit, P., Gommans, L., Jog., Ch., de Laat, C., Mambretti, J., Monga, I., van Oudernaarde, B., Raghunath, S., and Wang, P.Y.: Seamless live migration of virtual machines over the MAN/WAN. Future Generation Computer Systems 22:901–907, 2006.
- \[23\]
King, S.T., Dunlap, G.W., and Chen, P.M.: Debugging operating systems with time-traveling virtual machines. In: Proc. of the 2005 Annual USENIX Technical Conference, April 2005.
- \[24\]
Bullers, W.I., Burd, S. and Seazzu, A.F.: Virtual Machines - An Idea Whose Time Has Returned: Application to Network, Security and Database Courses. ACM SIGSE Bulletin 38(1):102–106, 2006.
- \[25\]
Damiani, E., Frati, F., and Rebeccani, D.: The Open Source Virtual Lab: a Case Study. In: Proc. of the Workshop on Free and Open Source Learning Environments and Tools FOSLET06, Lugano CH, 2006.
- \[26\]
Prevelakis, V.: The Virtual Firewall. ;login: The USENIX Magazine 30(6):27–34, 2005.
- \[27\]
Zhao, X., Borders, K., and Prakash, A.: Towards Protecting Sensitive Files in a Compromised System. In: Proc. of the 3rd IEEE Int. Security in Storage Workshop, pp.21–28, 2005.
- \[28\]
Matthews, J.N., Herne, J.J., Deshane, T.M., Jablonski, P.A., Cherian, L.R., and McCabe, M.T.: Data Protection and Rapid Recovery From Attack With A Virtual Private File Server and Virtual Machine Appliances. In: Proc. of the IASTED Int. Conf. on Communication, Network and Information Security, pp.170–181, Nov. 2005.
- \[29\]
Gold, B.D., Linde, R.R., Schaefer, M., and Scheid, J.F.: VM/370 Security Retrofit Program. In: ACM Proc. of the 1977 Annual Conference, pp.411–418, 1977.
- \[30\]
Ormandy, T.: An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments. In: CanSecWest 2007, Vancouver BC, Apr. 18-20, 2007.
- \[31\]
King, S.T., Chen, P.M., Wang, Y-M., Verbowski, C., Wang, H.J., and Lorch, J.R. SubVirt: Implementing malware with virtual machines. In: Proc. of the 2006 IEEE Symposium on Security and Privacy, pp.314-327, May 2006.
- \[32\]
Rutkowska, J. Subverting Vista Kernel for Fun and Profit Black Hat USA 2006
- \[33\]
Zovi, D.D. Hardware Virtualization Based Rootkits Black Hat USA 2006
- \[34\]
Karger, P.A.: Multi-Level Security Requirements for Hypervisors. In: Proc. of the 21st Annual Computer Security Applications Conference, Tucson AZ, pp.267–275, Dec. 5-9, 2005.
- \[35\]
Sailer, R., Valdez, E., Jaeger, T., Perez, R., van Doorn, L. Griffin, J.L., and Berger, S.: sHype: Secure Hypervisor Approach to Trusted Virtualized Systems. IBM Research Report RC23511, 2005.
- \[36\]
Sailer, R., Jaeger, T., Valdez, E., Caceres, R., Perez, R., Berger, S., Griffin, J.L., and van Doorn, L.: Building a MAC-based Security Architecture for the Xen Open-Source Hypervisor. In: Proc. of the 21st Annual Computer Security Applications Conference, Tucson AZ, pp.276–285, Dec. 5-9, 2005.
- \[37\]
McDermott, J., Kang, M.: An Open-Source High Robustness Virtual Machine Monitor. The 22st Annual Computer Security Applications Conference, Miami Beach FL, Dec. 11-15, Works in Progress Session, WiP06-06, 2006.
- \[38\]
McCune, J.M., Jaeger, T., Berger, S., Caceres, R., and Sailer, R.: Shamon: A System for Distributed Mandatory Access Control. In: Proc. of the 22st Annual Computer Security Applications Conference, Miami Beach FL, pp.23–32, Dec. 11-15, 2006.
|
0705.0820
|
cs.NI
|
cyber
|
# Abnormal Netsukuku Domain Name Anarchy
http://netsukuku.freaknet.org
AlpT (@freaknet.org)
###### Abstract
In this document, we present the Abnormal Netsukuku Domain Name Anarchy system. ANDNA is the distributed, non hierarchical and decentralised system of hostname management used in the Netsukuku network.
## 1 Preface
We’re assuming that you already know the basics of the Netsukuku topology. If not, read the topology document first: \[[2](#bib.bib2)\].
## 2 Introduction
ANDNA is the distributed, non hierarchical and decentralised system of hostname management in Netsukuku. It substitutes the DNS.
The ANDNA database is scattered inside all Netsukuku network. In the worst case, every node will have to use few hundred kilobytes of memory.
## 3 ANDNA
ANDNA is based on the principle that every hostname $`h`$ is a string of maximum 512 bytes. By taking the hash $`H\hspace{0pt}{(h)}`$ of the hostname, we obtain a number. We consider this number an IP and we call *hash node* the node which owns the same IP. Every hash node will keep a small portion of the distributed database of ANDNA.
```
Node n
ip: 123.123.123.123
hash( hostname: "netsukuku" ) == 11.22.33.44
||
||
Node i
ip: 11.22.33.44
{ [ Andna database of the node i ] }
{ hash("netsukuku") ---> 123.123.123.123 }
```
The registration of the hostname $`h`$, by the node $`n`$ proceeds as follow:
1. 1\.
$`n`$ computes $`i = {H\hspace{0pt}{(h)}}`$
2. 2\.
$`n`$ sends a registration request to $`i`$
3. 3\.
$`i`$ associates in its database $`H\hspace{0pt}{(h)}`$ to the IP of $`n`$, which is $`I\hspace{0pt}P\hspace{0pt}{(n)}`$.
The resolution of the hostname $`h`$ by the node $`m`$:
1. 1\.
$`m`$ computes $`i = {H\hspace{0pt}{(h)}}`$
2. 2\.
$`m`$ sends a resolution query to $`i`$
3. 3\.
$`i`$ sends back to $`m`$ the IP associated to $`H\hspace{0pt}{(h)}`$, that in this example is $`I\hspace{0pt}P\hspace{0pt}{(n)}`$.
### 3.1 Hash gnode
It is highly probable that the hash $`H\hspace{0pt}{(h)}`$ doesn’t corresponds to any active node: if there are a total of $`2^{3}\hspace{0pt}0`$ active nodes and we are using IP of 32 bits, then by taking the 32 bit hash of $`h`$ the probability is equal to $`25\%`$. Moreover, even the actives node can also exit from the network.
For this reasons, the registration of a hostname will be kept by all the nodes of a single gnodes. This ensures the distribution and the redundancy of the database. The gnode associated to $`H\hspace{0pt}{(h)}`$ is the *hash gnode*, and it is simply the gnode of level 1 of the hash node $`H\hspace{0pt}{(h)}`$. We will denote the former with $`g\hspace{0pt}H\hspace{0pt}{(h)}`$ and the latter with $`n\hspace{0pt}H\hspace{0pt}{(h)}`$. In symbols we can write: $`{n\hspace{0pt}H\hspace{0pt}{(h)}} \in {g\hspace{0pt}H\hspace{0pt}{(h)}}`$.
### 3.2 Approximated hash gnode
Since even the hash gnodes cannot exist, an approximation strategy is utilised: the nearest active gnode to the hash gnode becomes the *rounded hash gnode*, which will substitute in full the original (non existent) hash gnode. The rounded hash gnode is denoted with $`r\hspace{0pt}g\hspace{0pt}H\hspace{0pt}{(h)}`$.
Generally, when we are referring to the gnode, which has accepted a registration, there is no difference between the two kind of gnodes, they are always called hash gnodes.
### 3.3 Hook
When a node hooks to Netsukuku, it becomes automatically part of a hash gnode, thus it will also perform the *andna hook*. By hooking, it will get from its rnodes all the caches and databases, which are already distributed inside its hash gnode.
### 3.4 Cryptographic ANDNA
Before making a request to ANDNA, a node generates a couple of RSA keys, i.e. a public one (*pub key*) and a private (*priv key*). The size of the pub key will be limited due to reasons of space. The request of a hostname made to ANDNA will be signed with the private key and in the same request the public key will be attached. In this way, the node will be able to certify the true identity of its future requests.
### 3.5 Hostnames limit
The maximum number of hostnames, which can be registered is 256. This limit is necessary to prevent the massive registration of hostnames, which may lead to a overload of the ANDNA system. One its side effect is to slow down the action of spammers, which registers thousands of common words to resell them.
#### 3.5.1 Implementation of the limit
The *counter node* is a node with an ip equal to the hash of the public key of the node, which has registered the hostname $`h`$. We’ll denote the counter node associated to the node $`n`$ with $`c\hspace{0pt}r\hspace{0pt}{(n)}`$. Thus, for every node $`n`$, which has registered a hostname $`h`$, exists its corresponding counter node $`c\hspace{0pt}r\hspace{0pt}{(n)}`$.
The counter node $`c\hspace{0pt}r\hspace{0pt}{(n)}`$ will keep the number of hostnames registered by $`n`$.
When a hash gnode receives the registration request sent by $`n`$, it contacts $`c\hspace{0pt}r\hspace{0pt}{(n)}`$, which replies by telling how many hostnames have been already registered by the $`n`$. If the $`n`$ has not exceeded its limit, then $`c\hspace{0pt}r\hspace{0pt}{(n)}`$ will increment its counter and will allow the hash gnode to register the hostname.
$`c\hspace{0pt}r\hspace{0pt}{(n)}`$ is activated by the check request the hash gnode sends. $`n`$ has to keep the $`c\hspace{0pt}r\hspace{0pt}{(n)}`$ active following the same rules of the hibernation (see the chapter below). Practically, if $`c\hspace{0pt}r\hspace{0pt}{(n)}`$ doesn’t receives any more check requests, it will deactivate itself, and all the registered hostnames will become invalid.
The same distribution technique used for the hash gnode is used for the counter node: there is a whole gnode of counter nodes, which is called, indeed, counter gnode.
### 3.6 Registration step by step
1. 1\.
The node $`n`$ wants to register its hostname $`h`$,
2. 2\.
it finds the rounded hash gnode $`r\hspace{0pt}g\hspace{0pt}H\hspace{0pt}{(h)}`$ and contacts, randomly, one of its node. Let this node be $`y`$.
3. 3\.
$`n`$ sends the registration request to $`y`$. The request includes the public key of the node $`n`$. The pkt is also signed with the private key of $`n`$.
4. 4\.
The node $`y`$ verifies to be effectively the nearest gnode to the hash gnode, on the contrary it rejects the request. The signature validity is also checked.
5. 5\.
The node $`y`$ contacts the counter gnode $`c\hspace{0pt}r\hspace{0pt}{(n)}`$ and sends to it the IP, the hash of th hostname to be registered and a copy of the registration request itself.
6. 6\.
$`c\hspace{0pt}r\hspace{0pt}{(n)}`$ checks the data and gives its ok.
7. 7\.
The node $`y`$, after the affirmative reply, accepts the registration request and adds the entry in its database, storing the date of registration,
8. 8\.
$`y`$ forwards to its gnode the registration request.
9. 9\.
The nodes, which receive the forwarded request, will check its validity and store the entry in their db.
### 3.7 Hostname hibernation
The hash gnode keeps the hostname in an hibernated state for about 30 days since the moment of its registration or last update. The expiration time is very long to stabilise the domains. In this way, even someone attacks a node to steal its domain, it will have to wait 30 days to fully have it.
When the expiration time runs out, all the expired hostnames are deleted and substituted with the others in queue.
A node has to send an update request for each of its hostnames, each time it changes ip and before the hibernation time expires, in this way it’s hostname won’t be deleted.
The packet of the update request has an id, which is equal to the number of updates already sent. The pkt is also signed with the private key of the node to warrant the true identity of the request. The pkt is sent to any node of the hash gnode, which will send a copy of the request to the counter gnode, in order to verify if it is still active and that the entry related to the hostname being updated exists. On the contrary, the update request is rejected.
### 3.8 Hash gnodes mutation
If a generical rounded gnode is overpassed by a new gnode, which is nearer to the hash gnode, it will exchange its role with that of the second one, i.e. the new gnode will become the rounded hash gnode.
This transition takes place passively. When the register node will update its hostname, it will directly contact the new rounded gnode. Since the hostname stored inside the old rounded gnode won’t be updated, it will be dropped.
While the hostname has not been updated yet, all the nodes trying to resolve it, will find the new rounded gnode as the gnode nearest to the hash gnode and so they’ll send their resolution queries to the new gnode.
When the new rounded gnode receives the first query, it will notice that it is indeed a rounded gnode and to reply to the query, it it will retrieve from the old hash gnode the andna cache related to the hostname to resolve.
In this way, the registration of that hostname is automatically transfered from the old gnode into the new one.
If an attacker is able to send a registration request to the new hash gnode, before that the rightful owner of the hostname updates it or before that the passive transfer occurs, it will be able to steal it.
To prevent this, the new hash gnode will always double check a registration request by contacting the old hash gnode.
### 3.9 Yet another queue
Every node is free to choose any hostname, even if the hostname has been already chosen by another node.
The andna cache will keep a queue of MAX_ANDNA_QUEUE (5) entries. When the hostname on top of the queue expires, it will be automatically substituted by the next hostname.
### 3.10 Distributed cache for hostname resolution
In order to optimise the resolution of a hostname, a simple strategy is used: a node, each time it resolves a hostname, stores the result in a cache. For each next resolution of the same hostname, the node has already the result in its cache.
Since the resolution packet contains the latest time when the hostname has been registered or updated, an entry in the cache will expires exactly at the same time of the ANDNA hostname expiration.
The *resolved hnames* cache is readable by any node.
A node $`x`$, exploiting this feature, can ask to any node $`y`$, randomly chosen inside its same gnode, to resolve for itself the given hostname. The node $`y`$, will search in its resolved cache the hostname and on negative result the node will resolve it in the standard way, sending the result to the node $`x`$. These technique avoids the overload of the hash gnodes keeping very famous hostnames.
### 3.11 noituloser emantsoh esreveR
If a node wants to know all the hostnames associated to an ip, it will directly contact the node which owns that ip.
### 3.12 DNS wrapper
The DNS wrapper listen to the resolution queries sent by localhost and wraps them: it sends to the ANDNA daemon the hostnames to resolve and receives the their resolutions.
Thanks to the wrapper it is possible to use the ANDNA without modifying any preexistent programs.
See the ANDNS RFC \[[3](#bib.bib3)\] and the ANDNA manual \[[4](#bib.bib4)\].
## 4 Scattered Name Service Disgregation
The updated SNSD RFC can be found here: \[[5](#bib.bib5)\]
The Scattered Name Service Disgregation is the ANDNA equivalent of the SRV Record\[[6](#bib.bib6)\] of the Internet Domain Name System.
SNSD isn’t the same of the “SRV Record”, in fact, it has its own unique features.
With the SNSD it is possible to associate IPs and hostnames to another hostname.
Each assigned record has a service number, in this way the IPs and hostnames which have the same service number are grouped in an array. In the resolution request the client will specify the service number too, therefore it will get the record of the specified service number which is associated to the hostname. Example:
1. 1\.
The node X has registered the hostname ”angelica”. The default IP of “angelica” is “1.2.3.4”.
2. 2\.
X associates the “depausceve” hostname to the ‘http’ service number (80) of “angelica”.
3. 3\.
X associates the “11.22.33.44” IP to the ‘ftp’ service number (21) of “angelica”.
When the node Y resolves normally “angelica”, it gets 1.2.3.4, but when its web browser tries to resolve it, it asks for the record associated to the ‘http’ service, therefore the resolution will return ”depausceve”. The browser will resolve ”depausceve” and will finally contact the server. When the ftp client of Y will try to resolve ”angelica”, it will get the ”11.22.33.44” IP.
The node associated to a SNSD record is called ”SNSD node”. In this example ”depausceve” and 11.22.33.44 are SNSD nodes.
The node which registers the records and keeps the registration of the main hostname is always called ”register node”, but it can also be named ”Zero SNSD node”, in fact, it corresponds to the most general SNSD record: the service number 0.
Note that with the SNSD, the NTK_RFC 0004 will be completely deprecated.
### 4.1 Service, priority and weight number
#### 4.1.1 Service number
The service number specifies the scope of a SNSD record. The IP associated to the service number ‘x’ will be returned only to a resolution request which has the same service number.
A service number is the port number of a specific service. The port of the service can be retrieved from /etc/services.
The service number 0 corresponds to a normal ANDNA record. The relative IP will be returned to a general resolution request.
#### 4.1.2 Priority
The SNSD record has also a priority number. This number specifies the priority of the record inside its service array.
The client will contact first the SNSD nodes which have the higher priority, and only if they are unreachable, it will try to contact the other nodes which have a lower priority.
#### 4.1.3 Weight
The weight number, associated to each SNSD record, is used when there are more than one records which have the same priority number. In this case, this is how the client chooses which record using to contact the servers:
The client asks ANDNA the resolution request and it gets, for example, 8 different records.
The first record which will be used by the client is chosen in a pseudo-random manner: each record has a probability to be picked, which is proportional to its weight number, therefore the records with the heavier weight are more likely to be picked.
Note that if the records have the same priority, then the choice is completely random.
It is also possible to use a weight equal to zero to disable a record.
The weight number has to be less than 128.
### 4.2 SNSD Registration
The registration method of a SNSD record is similar to that described in the NTK_RFC 0004.
It is possible to associate up to 16 records to a single hostname. The maximum number of total records which can be registered is 256.
The registration of the SNSD records is performed by the same register node. The hash node which receives the registration won’t contact the counter node, because the hostname is already registered and it doesn’t need to verify anything about it. It has only to check the validity of the signature.
The register node can also choose to use an optional SNSD feature to be sure that a SNSD hostname is always associated to its trusted machine. In this case, the register node needs the ANDNA pubkey of the SNSD node to send a periodical challenge to the node. If the node fails to reply, the register node will send to ANDNA a delete request for the relative SNSD record.
The registration of SNSD records of hostnames which are only queued in the andna queue is discarded.
Practically, the steps necessary to register a SNSD record are:
1. 1\.
Modify the `/etc/netsukuku/snsd_nodes` file.
```
register_node# cd /etc/netsukuku/
register_node# cat snsd_nodes
#
# SNSD nodes file
#
# The format is:
# hostname:snsd_hostname:service:priority:weight[:pub_key_file]
# or
# hostname:snsd_ip:service:priority:weight[:pub_key_file]
#
# The ‘pub_key_file’ parameter is optional. If you specify it, NetsukukuD will
# check periodically ‘snsd_hostname’ and it will verify if it is always the
# same machine. If it isn’t, the relative snsd will be deleted.
#
depausceve:pippo:http:1
depausceve:1.2.3.4:21:0
angelica:frenzu:ssh:1:/etc/netsukuku/snsd/frenzu.pubk
register_node#
register_node# scp frenzu:/usr/share/andna_lcl_keyring snsd/frenzu.pubk
```
2. 2\.
Send a SIGHUP to the NetsukukuD of the register node:
```
register_node# killall -HUP ntkd
# or, alternatively
register_node# rc.ntk reload
```
#### 4.2.1 Zero SNSD IP
The main IP associated to a normal hostname has these default values:
```
IPΨ = register_node IPΨ# This value can’t be changed
service = 0
priority = 16
weight = 1
```
It is possible to associate other SNSD records in the service 0, but it isn’t allowed to change the main IP. The main IP can only be the IP of the register_node.
Although it isn’t possible to set a different association for the main IP, it can be disabled by setting its weight number to 0.
The string used to change the priority and weight value of the main IP is:
```
hostname:hostname:0:priority:weight
# For example:
register_node# echo depausceve:depausceve:0:23:12 >> /etc/netsukuku/snsd_nodes
```
#### 4.2.2 SNSD chain
Since it is possible to assign different aliases and backup IPs to the zero record, there is the possibility to create a SNSD chain. For example:
```
depausceve registers: depausceve:80 --> pippo
pippo registers: pippo:0 --> frenzu
frenzu registers: frenzu:0 --> angelica
```
However the SNSD chains are ignored, only the first resolution is considered valid. Since in the zero service there’s always the main IP, the resolution is always performed.
In this case (”depausceve:80 –¿ pippo:0”) the resolution will return the main IP of ”pippo:0”.
The reply to a resolution request of service zero, returns always IPs and not hostnames.
## References
- \[1\] Netsukuku website: http://netsukuku.freaknet.org/
- \[2\] Netsukuku topology document: http://netsukuku.freaknet.org/doc/main_doc/topology.pdf
- \[3\] ANDNS RFC: http://lab.dyne.org/Ntk_andna_and_dns
- \[4\] ANDNA manual page: http://netsukuku.freaknet.org/doc/manuals/html/andna.html
- \[5\] SNSD RFC: http://lab.dyne.org/Ntk_SNSD
- \[6\] SRV record: http://www.ietf.org/rfc/rfc2782.txt
http://en.wikipedia.org/wiki/SRV_record
`^_^`
|
0704.3228
|
cs.NI
|
cyber
|
# Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis
Thomas Silverston, Olivier Fourmaux and Kavé Salamatian
Université Pierre et Marie Curie - Paris VI
Laboratoire LIP6/CNRS, UMR 7606
104 avenue du président Kennedy 75016 Paris, France
Email: {thomas.silverston, olivier.fourmaux, kave.salamatian}@lip6.fr
###### Abstract
P2P IPTV applications arise on the Internet and will be massively used in the future. It is expected that P2P IPTV will contribute to increase the overall Internet traffic. In this context, it is important to measure the impact of P2P IPTV on the networks and to characterize this traffic. During the 2006 FIFA World Cup, we performed an extensive measurement campaign. We measured network traffic generated by broadcasting soccer games by the most popular P2P IPTV applications, namely PPLive, PPStream, SOPCast and TVAnts. From the collected data, we characterized the P2P IPTV traffic structure at different time scales by using wavelet based transform method. To the best of our knowledge, this is the first work, which presents a complete multiscale analysis of the P2P IPTV traffic.
Our results show that the scaling properties of the TCP traffic present periodic behavior whereas the UDP traffic is stationary and lead to long-range depedency characteristics. For all the applications, the download traffic has different characteristics than the upload traffic. The signaling traffic has a significant impact on the download traffic but it has negligible impact on the upload. Both sides of the traffic and its granularity has to be taken into account to design accurate P2P IPTV traffic models.
## 1 Introduction
P2P live streaming applications like P2P IPTV are emerging on the Internet and will be massively used in the future. The P2P traffic counts already for a large part of the Internet traffic and this is mainly due to P2P file-sharing applications as BitTorrent \[[1](#bib.bib1)\] or eDonkey \[[2](#bib.bib2)\]. Video streaming services like Youtube \[[3](#bib.bib3)\] appeared only a few months ago but contribute already to an important part of the Internet traffic. It is expected that P2P IPTV will largely contribute to increase the overall Internet traffic. It is therefore important to study P2P IPTV traffic and to characterize its properties.
The characterization of P2P IPTV traffic will allow us to understand its impact on the network. P2P IPTV applications have stringent QoS constraints (e.g. bandwidth, delay, jitter) and their traffic characterization will enable to understand their exact needs in network resources. The knowledge of the traffic properties enables the development of synthetic traffic generation models that are key input parameters when modeling or simulating these systems. Indeed, the modeling or simulating steps are necessary to design judiciously applications. From a traffic engineering point of view, well understanding P2P IPTV traffic is essential for Internet service providers to forecast their internal traffic and ensure a good provisioning of their network. And last but not least, global knowledge of the traffic properties will highlight some drawbacks of the applications and will make it possible to improve the design of new P2P IPTV architectures. For instance, an important concern of these systems is the scalability. The traffic characterization may help estimate the impact of overhead traffic generated by the signaling.
In this paper, we present a multiscale analysis of the structure of the traffic generated by the most popular P2P IPTV applications, namely PPLive \[[4](#bib.bib4)\], PPStream \[[5](#bib.bib5)\], SOPCast \[[6](#bib.bib6)\] and TVAnts \[[7](#bib.bib7)\].
During the 2006 FIFA World Cup, we performed an extensive measurement campaign. We measured the network traffic generated by broadcasting soccer games by the previously mentioned applications. The multiscale behavior of the collected traffic is analyzed using a wavelet transform based tool. In this paper, we characterize the network traffic of P2P IPTV systems at different time scales and compare their properties. To the best of our knowledge, this is the first work that does a comparative multiscale characterization of P2P IPTV traffic.
Our multiscale P2P IPTV traffic analysis shows significant differences in the scaling behaviors of TCP and UDP traffic. the TCP traffic presents periodic behavior while the UDP traffic is stationary and presents long-range dependency characteristics, which will affect the quality of the video reception. The signaling traffic has an impact on the download traffic but it has negligible impact on the upload traffic. The upload traffic generated by P2P IPTV systems have different scaling characteristics compare to the download traffic and both sides of the traffic has to be taken into account to design judiciously P2P IPTV traffic models. Moreover, the traffic granularity has to be considered while using traffic models to simulate these systems.
The rest of the paper is organized as follows. Firstly, we present the related work in section [2](#S2 "2 Related Work ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"). In section [3](#S3 "3 Experiments ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), we give an overview of the measured applications and describe our measurement experiment setup. In section [4](#S4 "4 Analysis Methodology ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), we present our methodology to analyze the traffic at different time scales. We present our P2P IPTV traffic analysis in section [5](#S5 "5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and discuss the results in section [6](#S6 "6 Results Discussion ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"). Finally, we conclude the paper and give perspectives in section [7](#S7 "7 Conclusion ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis").
## 2 Related Work
Nowadays, an increasing number of P2P IPTV measurement studies is conducted to analyze the mechanisms of such systems.
Zhang et. al \[[8](#bib.bib8)\] present the first measurement results about their protocol Donet \[[9](#bib.bib9)\], which were deployed on the Internet and called Coolstreaming. They provide network statistics, like user’s behavior in the whole system and the quality of video reception.
Hei et al. \[[10](#bib.bib10)\] \[[11](#bib.bib11)\] made a complete measurement of the popular PPLive application. They made active measurements by instrumentalizing their own crawler and give many architecture and overlay details like buffer size or number of peers in the networks. Vu et al. \[[12](#bib.bib12)\] made also active measurements of the PPLive system and derive mathematical models for the distributions of channel population size or session length.
In our previous work \[[13](#bib.bib13)\], we passively measured the network traffic generated by several popular applications during a worldwide event. We compared the measured applications by inferring their underlying mechanisms and highlight their design differences and similarities. Ali et al. \[[14](#bib.bib14)\] made passive measurements of PPLive and SOPCast applications and analyze the performance and characteristics of such systems.
Still in their previously mentioned works, Ali et al. provide their own methodology to study the data exchanges of such P2P applications. Based on their measurement studies, Hei et al. \[[15](#bib.bib15)\] developed also a methodology to estimate the overall perceived video quality throughout the network.
All these works studied P2P IPTV systems by measuring the traffic and tried to infer their mechanisms, but they did not characterize the correlation structure of the generated traffic at different time scales to understand its properties and its impact on the network.
## 3 Experiments
### 3.1 P2P IPTV applications overview
For our P2P IPTV traffic measurement experiments, we chose four applications, namely PPLive, PPStream, SOPCast and TVAnts because they were very popular on the Internet. Whenever these applications are freely available, their source codes are not open and their exact implementation details and used protocols are still widely unknown. We can only rely on reverse engineering to understand their transmission mechanisms.
All these applications claim to use swarming protocol like Donet. Similarly to BitTorrent, video data flows are divided into data chunks and each peer downloads the chunck of data to other peers concurrently. The peers know how to download the video data chunks by exchanging randomly with other peers information about the data chunks they have or neighbor peers they know. With this signaling traffic, each peer discovers iteratively new peers, new available data chunks and is able to download video from several peers. In these P2P protocols, there are two kinds of traffic: video traffic where peers exchange data chunks with each other and signaling traffic where peers exchange information to get the data.
As we show in \[[13](#bib.bib13)\], all the applications transport video and signaling traffics differently: PPStream uses exclusively TCP for all traffics while PPLive adds UDP for some signaling traffic. SOPCast uses almost entirely UDP and TVAnts is more balanced between TCP ($`\approx`$ 75%) and UDP for all kinds of traffic.
In the next section, we will present the measurement experiments platform we used to collect the P2P IPTV traffic.
### 3.2 Measurement experiments platform
[Refer to caption](/html/0704.3228/assets/x1.png)
Figure 1: Measurement experiments platform. Each node is a common PC directly connected to the Internet via campus network.
Table 1: Packet traces summary
<table>
<tbody>
<tr>
<td></td>
<td>PPLive</td>
<td>PPStream</td>
<td>SOPCast</td>
<td>TVAnts</td>
</tr>
<tr>
<td>Duration (s)</td>
<td>13,321</td>
<td>12,375</td>
<td>12,198</td>
<td>13,358</td>
</tr>
<tr>
<td>Size (MB)</td>
<td>6,339</td>
<td>4,121</td>
<td>5,475</td>
<td>3,992</td>
</tr>
<tr>
<td>Download(%)</td>
<td>14.11</td>
<td>20.50</td>
<td>16.13</td>
<td>24.76</td>
</tr>
<tr>
<td>TCP</td>
<td>14.09</td>
<td>20.50</td>
<td>0.23</td>
<td>14.71</td>
</tr>
<tr>
<td>UDP</td>
<td>0.02</td>
<td>0</td>
<td>15.90</td>
<td>10.05</td>
</tr>
<tr>
<td>Upload(%)</td>
<td>85.89</td>
<td>79.50</td>
<td>83.87</td>
<td>75.24</td>
</tr>
<tr>
<td>TCP</td>
<td>85.81</td>
<td>79.50</td>
<td>3.89</td>
<td>61.67</td>
</tr>
<tr>
<td>UDP</td>
<td>0.08</td>
<td>0</td>
<td>79.98</td>
<td>13.57</td>
</tr>
</tbody>
</table>
Our measurement experiments take place during the 2006 FIFA World Cup from 09 June to 09 July. We collected a huge amount of data, measuring most of the World Cup soccer games with different applications at the same time and under different network environments: campus Ethernet access and residential ADSL access.
In this paper, we focus on four packet traces collected on June 30 in our campus network: one for each measured application. In all our data, we selected these packet traces because they are well representative of all of them. The traces are made available on our traces sharing service \[[16](#bib.bib16)\]. Two soccer games were scheduled, one in the afternoon (Germany vs. Argentine) measured by PPStream and SOPCast and one in the evening (Italy vs. Ukraine) measured by PPLive and TVAnts. We selected the four traces from different applications to be able to characterize the P2P IPTV traffic without being closely related to the design of the applications.
Our measurement experiment set up is described on Fig. [1](#S3.F1 "Figure 1 ‣ 3.2 Measurement experiments platform ‣ 3 Experiments ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"). To collect the packets, we used two personal computers with 1.8GHz CPU and common graphic card capabilities. The operating system running on the PCs was Windows XP. The PCs (nodes) were situated in our campus network and were directly connected to the Internet with 100Mbps Ethernet access. During a game, each node was running a P2P IPTV application and we used tcpdump on each measuring node to collect all the packets. For all the measurement experiments, the consumed bandwidth was always relatively low and does not exceed 10Mbps. The Ethernet cards did not suffer any packet loss and captured all the packets. For all the experiments, nodes were watching CCTV5, a Chinese TV channel available for all the measured applications. It was important to watch the same TV channel with all the applications to assure that the behavior of users will be similar in each trace. For example, during the advertisement, whatever the applications, an user may stop watching the channel and switches the application off and then switch it on a few minutes later. All the applications used MPEG4 video encoding.
Our platform has high-speed access and our observations can not be directly generalized to residential peers with common access to the Internet (e.g. 20/1 Mbps or 512/128 Kbps). However, residential network capacities are quickly increasing and will have such high-speed access in only a few years when P2P IPTV would be commonly used.
Table [1](#S3.T1 "Table 1 ‣ 3.2 Measurement experiments platform ‣ 3 Experiments ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") summarizes the four presented traces. At first, we can notice in these traces that PPLive, TVAnts and PPStream use massively TCP whereas only SOPCast uses mainly UDP. The duration of the traces is longer than the duration of a soccer game ($`\approx`$ 105 minutes). We chose to collect the traffic a few minutes before and after the games to capture all the effects that the live interest of a soccer game could produce on the behavior of users (e.g. flash crowds).
## 4 Analysis Methodology
[Refer to caption](/html/0704.3228/assets/x2.png)
\(a\)
PPLive
[Refer to caption](/html/0704.3228/assets/x3.png)
\(b\)
SOPCast
[Refer to caption](/html/0704.3228/assets/x4.png)
\(c\)
PPStream
[Refer to caption](/html/0704.3228/assets/x5.png)
\(d\)
TVAnts
Figure 2: Packet distributions for all the applications
### 4.1 Video and signaling traffics
The packet size distributions for all the applications are presented in Fig. [2](#S4.F2 "Figure 2 ‣ 4 Analysis Methodology ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"). PPLive has 75% of its packets larger than 1300 Bytes and the other packets are very small ($`\approx`$ 17% are 100 Bytes length). Differently, SOPCast counts only about 30% of large packets ($`>`$ 1300 Bytes) and 60% of its packets are very small ($`<`$100 Bytes). PPStream counts more than 40% of packets bigger than 1400 Bytes, almost 40% of its packets are 100 Bytes and a small part is 1000 Bytes. TVAnts packets seems more balanced in three equal parts: one part is 100 Bytes, a second part is 1100 Bytes and the third part is 1400 Bytes.
All the packets distributions of these applications are different but we can distinguish two sets of packets within these packet distributions: small-size packets ($`<`$ 200 Bytes) and large-size packets ($`>`$ 1000 Bytes). As we explained in section [3](#S3 "3 Experiments ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), the studied P2P applications generate two kinds of traffic: video and signaling.
It is expected that the video traffic is essentially composed of large-size packets. Most of the video packets should belong to the large-size packets set ($`>`$ 1000 Bytes). The video data are also delay sensitive since video packets have to respect stringent playback delay for the users get a smooth quality video.
The signaling packets should belong to the small-size packets set ($`<`$ 200 Bytes). The signaling traffic of P2P IPTV systems is not expected to be delay sensitive because it is used to exchange information about peers or data availability but not for interactive commands as for Video on-Demand systems like Joost \[[17](#bib.bib17)\]. In video on-demand systems, the users may want to read the video forward or backward instantaneously. In the case of P2P IPTV, it is not possible to have this kind of interactive commands since the data flows are broadcasted in live.
The signaling and video traffics have not the same characteristics as packet size or delay constraints and they would have a different impact on the network. We have therefore to separate video and signaling traffic and to analyze them separately.
### 4.2 Signaling traffic filtering heuristic
Table 2: Signaling Traffic Ratio
<table>
<tbody>
<tr>
<td></td>
<td>PPLive</td>
<td>PPStream</td>
<td>SOPCast</td>
<td>TVAnts</td>
</tr>
<tr>
<td>Total</td>
<td>4.1%</td>
<td>13.6%</td>
<td>19.3%</td>
<td>10.2%</td>
</tr>
<tr>
<td>Upload</td>
<td>2.2%</td>
<td>10.8%</td>
<td>13.6%</td>
<td>7.8%</td>
</tr>
<tr>
<td>Download</td>
<td>19.2%</td>
<td>25.8%</td>
<td>48.5%</td>
<td>18.0%</td>
</tr>
</tbody>
</table>
By observing that the video packets size should be larger than 1000 Bytes and signaling packets should be much smaller ($`<`$ 200 Bytes), we used the simple heuristic proposed by Hei. \[[10](#bib.bib10)\] to separate the video traffic from the overall traffic. The heuristic works as follows: for a session (same IP addresses and ports), we counted the number of packets bigger or equal than 1000 Bytes. If a session had at least 10 large packets, then it was labeled as a video session and we removed small packets ($`<`$ 1000 Bytes) for this session. At the end, we removed all the non video-sessions from the trace to obtain video traffic.
At the end, we removed all the non video-sessions from the trace and all the labeled video sessions compose the video traffic.
Table [2](#S4.T2 "Table 2 ‣ 4.2 Signaling traffic filtering heuristic ‣ 4 Analysis Methodology ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") summarizes the signaling ratio for all the applications in the entire traces and in both upload or download directions. As an example, for PPLive, the signaling traffic represents 4.1% of the total traffic. If we consider both traffic directions, the signaling traffic represents 2.2% of the upload traffic whereas it represents 19.2% of the download traffic. The signaling traffic ratios will be discussed more deeply in the results analysis section ($`§`$ [5](#S5 "5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")).
The next section is dedicated to validate the heuristic used to filter the signaling traffic.
### 4.3 Validation of the signaling heuristic
The measured applications are proprietary and we do not have any implementation detail. We do not know exactly if a packet is for signaling traffic or video traffic. The heuristic used to filter the signaling traffic relies mainly on the packet size. The heuristic will perform well if it removes only signaling packets without removing any part of the video traffic.
From Table [2](#S4.T2 "Table 2 ‣ 4.2 Signaling traffic filtering heuristic ‣ 4 Analysis Methodology ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), we notice that the download signaling traffic ratio computed by the heuristic for SOPCast is 48.5%, which is a high ratio indicating that half of the traffic would have been signaling traffic. This high ratio of download signaling traffic may eventually come from the inaccuracy of the heuristic.
To validate the filtering heuristic, we compute the resulting video bitrate after removing the signaling traffic. Realistic computed video bitrate will confirm the efficiency of the heuristic. We compute the video bitrate for download traffic because it is the only video traffic we can deduce. The download traffic is provided by other peers on the Internet and all the video flows received by our controlled nodes compose the downloaded video. The video upload traffic is not provided to a single consumer peer. We can not estimate the video bitrate received by remote peers because they mix video flows from many other providers peers to receive the entire video. In the following, we compute for all the traces the video download bitrate received by our controlled nodes by removing signaling traffic with the presented heuristic.
Fig. [2(b)](#S4.F2.sf2 "In Figure 2 ‣ 4 Analysis Methodology ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") indicates that SOPCast has more than 60% of its packets smaller than 100 Bytes. These packet are certainly signaling packets according to their size. The design of SOPCast introduces a large amount of signaling packets and the heuristic removes these packets from the video traffic.
Table [1](#S3.T1 "Table 1 ‣ 3.2 Measurement experiments platform ‣ 3 Experiments ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") shows that the SOPCast download traffic represents 16.13% of the collected traffic (5,475 MBytes) and the download signaling ratio represents 48.5% of the overall download traffic. The average bandwidth used by SOPCast to download the video at its bitrate can be computed by dividing the amount of received video data by the measurement experiment duration (12,198s).
<table>
<tbody>
<tr>
<td></td>
<td>(5475∗220∗8∗0.1613)∗(1−0.485)12198≈305Kbps5475superscript22080.161310.48512198305𝐾𝑏𝑝𝑠\frac{(5475*2^{20}*8*0.1613)*(1-0.485)}{12198}\approx 305Kbps</td>
<td></td>
</tr>
</tbody>
</table>
For SOPCast, the video download speed (305Kbps) computed with the heuristic is realistic for downloading a video broadcasted in the Internet.
Table [3](#S4.T3 "Table 3 ‣ 4.3 Validation of the signaling heuristic ‣ 4 Analysis Methodology ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") shows the computed download speeds for all the applications.
Table 3: Video Download Bitrate computed with the signaling filtering heuristic
<table>
<thead>
<tr>
<th></th>
<th>PPLive</th>
<th>PPStream</th>
<th>SOPCast</th>
<th>TVAnts</th>
</tr>
</thead>
<tbody>
<tr>
<td>Video Bitrate</td>
<td rowspan="2">445</td>
<td rowspan="2">415</td>
<td rowspan="2">305/360</td>
<td rowspan="2">500</td>
</tr>
<tr>
<td>(Kbps)</td>
</tr>
</tbody>
</table>
All the computed download speeds are realistic and it confirms that the heuristic used to filter signaling traffic performs well and is efficient to distinguish signaling traffic from the overall traffic. Our node running SOPCast receives really a lot of signaling packets from other peers in the Internet and this high ratio is not distorted by the heuristic.
To have a finer understanding of the high signaling traffic ratio of SOPCast, we show in our previous work \[[13](#bib.bib13)\] that SOPCast received no video traffic during 30 minutes. The video source suffered troubles during this period of time. In this period, our node was only receiving signaling traffic from other peers requesting video data chunks, but no video chunks were received. Since our node has high bandwidth capabilities, lots of peers were requesting video generating a large amount of signaling traffic. This phenomenon increased artificially the SOPCast signaling traffic and explains why the signaling traffic ratio SOPCast experiments in the download direction was so high. If we take into account this lack of video data during 30mn in our calculation, we obtain 360Kbps video download bitrate, which is a more realistic bitrate closer to all the other computed video bitrate.
In this section, we validate the choice of the heuristic used to filter signaling traffic from the entire traces. In the following, for each trace, we will consider the overall traffic generated by the applications and the video traffic without any signaling packet deduced by using the signaling filtering heuristic.
To characterize the correlation structure of the generated traffic at different time scales, we analyzed the traffic using a wavelet based transform method. To this end, we used a tool that is presented in the next section.
### 4.4 Multiscale traffic analysis
We analyze the measured P2P IPTV traffic at different time scales to characterize this traffic and its properties. To this end, we compute the energy spectrum of the traffic at different time scales using a wavelet based transform method. The smaller time scales analyzed is the 20 milliseconds intervals as we observed that inter arrivals are rarely below this value (our bin duration is 20ms). In each interval, we counted the number of packet arrivals in both directions (i.e. upload and download). We only counted arrivals of packets with data payload and do not take into account empty TCP Acknowledgment packets.
Logscale Diagram Estimate \[[18](#bib.bib18)\] (LDestimate) is based on discrete wavelet transform and allows to analyze the scaling behavior of the packet traffic. LDestimate produces a logarithmic plot of the data energy spectrum.
For all the produced logscale diagrams, the X-axes are the octaves of the traffic, which are the time scales of the packet arrivals. The right-most part of the graph is relative to large time scales and the left part is relative to small time scales. The Y-axes are the data energy spectra. A logscale diagram can be understood as follows: an octave $`j`$ (X-axes) is a time scale of the packet traffic energy spectrum. Since our bin is 20 ms, the octave $`j = 8`$ means the time scale $`t = {{2^{8} \ast 20}\hspace{0pt}m\hspace{0pt}s} = {5.12\hspace{0pt}s}`$.
LDEstimate is a tool that allow to visually observed the properties of the measured traffic. In a produced diagram, a bump in the energy spectrum indicates a possible periodic behavior of the traffic, a constant energy spectrum a possible memoryless process and a linear increase indicates a possible long-range dependency of the traffic (LRD).
## 5 Results Analysis
[Refer to caption](/html/0704.3228/assets/x6.png)
\(a\)
Upload: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x7.png)
\(b\)
Upload: video packet traffic
[Refer to caption](/html/0704.3228/assets/x8.png)
\(c\)
Download: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x9.png)
\(d\)
Download: video packet traffic
Figure 3: PPlive packet traffics energy spectra. Bin duration is 20ms. (Ex: Octave $`j = 8`$ is for scale process at $`t = {{2^{8} \ast 20}\hspace{0pt}m\hspace{0pt}s} = {5.12\hspace{0pt}s}`$).
[Refer to caption](/html/0704.3228/assets/x10.png)
\(a\)
Upload: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x11.png)
\(b\)
Upload: video packet traffic
[Refer to caption](/html/0704.3228/assets/x12.png)
\(c\)
Download: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x13.png)
\(d\)
Download: video packet traffic
Figure 4: SOPCast packet traffics energy spectra. Bin duration is 20ms. (Ex: Octave $`j = 8`$ is for scale process at $`t = {{2^{8} \ast 20}\hspace{0pt}m\hspace{0pt}s} = {5.12\hspace{0pt}s}`$).
[Refer to caption](/html/0704.3228/assets/x14.png)
\(a\)
Upload: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x15.png)
\(b\)
Upload: video packet traffic
[Refer to caption](/html/0704.3228/assets/x16.png)
\(c\)
Download: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x17.png)
\(d\)
Download: video packet traffic
Figure 5: PPStream packet traffics energy spectra. Bin duration is 20ms. (Ex: Octave $`j = 8`$ is for scale process at $`t = {{2^{8} \ast 20}\hspace{0pt}m\hspace{0pt}s} = {5.12\hspace{0pt}s}`$).
[Refer to caption](/html/0704.3228/assets/x18.png)
\(a\)
Upload: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x19.png)
\(b\)
Upload: video packet traffic
[Refer to caption](/html/0704.3228/assets/x20.png)
\(c\)
Download: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x21.png)
\(d\)
Download: video packet traffic
Figure 6: TVAnts packet traffics energy spectra. Bin duration is 20ms. (Ex: Octave $`j = 8`$ is for scale process at $`t = {{2^{8} \ast 20}\hspace{0pt}m\hspace{0pt}s} = {5.12\hspace{0pt}s}`$).
### 5.1 Presentation
In the rest of the paper, we will refer to the traffic trace of an application by the name of the application. For example, we will refer to SOPCast packet trace by SOPCast.
For each application, we study the traffic by separating the upload traffic and the download traffic. In both traffic directions, we separated the video traffic from the overall traffic by using the filtering heuristic presented in section [4.2](#S4.SS2 "4.2 Signaling traffic filtering heuristic ‣ 4 Analysis Methodology ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"). Then, each application is characterized by four distinct logscale diagrams: overall upload traffic, video upload traffic, overall download traffic and video download traffic. Fig. [3](#S5.F3 "Figure 3 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") presents the logscale diagrams of the energy spectra for PPLive, Fig. [4](#S5.F4 "Figure 4 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") the energy spectra for SOPCast, Fig. [5](#S5.F5 "Figure 5 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") for PPStream and Fig. [6](#S5.F6 "Figure 6 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") for TVAnts.
Table [1](#S3.T1 "Table 1 ‣ 3.2 Measurement experiments platform ‣ 3 Experiments ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") indicated previously that three of the measured applications use massively TCP (PPLive, PPStream and TVAnts) whereas only SOPCast uses mainly UDP. We will refer to an application using massively TCP as TCP application and UDP application for an application using UDP.
In the following, we will present traffic differences between TCP and UDP applications in section [5.2](#S5.SS2 "5.2 TCP applications vs. UDP applications ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"). In section [5.3](#S5.SS3 "5.3 Impact of the signaling traffic ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") we will highlight the impact of the signaling traffic for P2P IPTV applications. Then we discuss the stationnarity of the traffic in section [5.4](#S5.SS4 "5.4 Traffic stationnarity ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"). We will extend our findings in section [5.5](#S5.SS5 "5.5 Analysis of the top download flows ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"). The results are summarized and discussed in section [6](#S6 "6 Results Discussion ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis").
### 5.2 TCP applications vs. UDP applications
For the TCP applications (PPLive, PPStream and TVAnts), the two upload energy spectra look similar for all the time scales (Fig. [3(a)](#S5.F3.sf1 "In Figure 3 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [3(b)](#S5.F3.sf2 "In Figure 3 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), Fig. [5(a)](#S5.F5.sf1 "In Figure 5 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [5(b)](#S5.F5.sf2 "In Figure 5 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), Fig. [6(a)](#S5.F6.sf1 "In Figure 6 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [6(b)](#S5.F6.sf2 "In Figure 6 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")) The two download energy spectra look similar until $`j = 9`$ and after they are different (Fig. [3(c)](#S5.F3.sf3 "In Figure 3 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [3(d)](#S5.F3.sf4 "In Figure 3 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), Fig. [5(c)](#S5.F5.sf3 "In Figure 5 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [5(d)](#S5.F5.sf4 "In Figure 5 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), Fig. [6(c)](#S5.F6.sf3 "In Figure 6 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [6(d)](#S5.F6.sf4 "In Figure 6 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")). The upload energy spectra of TCP applications ([3(a)](#S5.F3.sf1 "In Figure 3 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [3(b)](#S5.F3.sf2 "In Figure 3 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), [5(a)](#S5.F5.sf1 "In Figure 5 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [5(b)](#S5.F5.sf2 "In Figure 5 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), [6(a)](#S5.F6.sf1 "In Figure 6 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [6(b)](#S5.F6.sf2 "In Figure 6 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")) do not look like their download energy spectra ([3(c)](#S5.F3.sf3 "In Figure 3 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [3(d)](#S5.F3.sf4 "In Figure 3 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), [5(c)](#S5.F5.sf3 "In Figure 5 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [5(d)](#S5.F5.sf4 "In Figure 5 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), ([6(c)](#S5.F6.sf3 "In Figure 6 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [6(d)](#S5.F6.sf4 "In Figure 6 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")).
All the TCP applications have similar energy spectra whatever the kind of traffic and direction (e.g. overall or video). The observations for TCP applications may be generalized for all of those we measured (PPLive, PPStream and TVAnts).
For UDP applications (SOPCast Fig. [4](#S5.F4 "Figure 4 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")), the four energy spectra look similar whatever the traffic direction or the traffic nature (e.g. overall or video traffics).
The energy spectra of TCP applications (Fig. [3](#S5.F3 "Figure 3 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), [5](#S5.F5 "Figure 5 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [6](#S5.F6 "Figure 6 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")) are different from the energy spectra of UDP applications (Fig. [4](#S5.F4 "Figure 4 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")).
Regarding TCP applications energy spectra more precisely, we can observe an energy bump in all the logscale diagrams about time scale $`j = 8`$ (5.12s). The energy bump is more clearly defined in upload traffic (Fig. [3(a)](#S5.F3.sf1 "In Figure 3 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [3(b)](#S5.F3.sf2 "In Figure 3 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), Fig. [5(a)](#S5.F5.sf1 "In Figure 5 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [5(b)](#S5.F5.sf2 "In Figure 5 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), Fig. [6(a)](#S5.F6.sf1 "In Figure 6 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [6(b)](#S5.F6.sf2 "In Figure 6 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")) than download traffic (Fig. [3(c)](#S5.F3.sf3 "In Figure 3 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [3(d)](#S5.F3.sf4 "In Figure 3 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), Fig. [5(c)](#S5.F5.sf3 "In Figure 5 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [5(d)](#S5.F5.sf4 "In Figure 5 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), Fig. [6(c)](#S5.F6.sf3 "In Figure 6 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [6(d)](#S5.F6.sf4 "In Figure 6 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")).
The energy bump exists for all the applications using mostly TCP. The energy bump indicates a possible periodic behavior at these time scales whatever the traffic direction or its nature. The energy bump phenomenon has to be confirmed by studying the stationnarity of the traffic. We study traffic stationnarity in section [5.4](#S5.SS4 "5.4 Traffic stationnarity ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"). However, the stationnarity analysis shows that the energy bumps observed in the spectra are essential phenomena and not simply artifact coming from non-stationnarity.
The energy bumps are observed for all the TCP applications but not for the UDP applications. The well known TCP mechanisms used to transport data and TCP retransmission mechanisms could lead to such periodic traffic behaviors. However, the periodic behaviors are observed for time scale $`j = 8`$ (5.12s). A 5 seconds duration is a very long duration for TCP mechanisms. It is not so obvious that this periodic behavior is provided by TCP mechanisms.
The periodic behaviors could also come from the video broadcasted in the network. However, SOPCast does not show any energy bump in its energy spectra and SOPCast broadcasts also video in the network.
Currently, we can not surely establish the source of these periodic behaviors. It does not seem to come from TCP mechanisms nor broadcasted video. We are still investigating the periodic behavior we observed in the TCP applications energy spectra.
The energy bumps are characteristics shared by all the measured applications using massively TCP. They illustrate how the application design may impact the properties of the generated network traffic.
### 5.3 Impact of the signaling traffic
For all the applications, whatever the transport protocol they use, their video upload energy spectra look like their overall upload energy spectra. This is illustrated on Fig. [3(a)](#S5.F3.sf1 "In Figure 3 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [3(b)](#S5.F3.sf2 "In Figure 3 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), [4(a)](#S5.F4.sf1 "In Figure 4 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [4(b)](#S5.F4.sf2 "In Figure 4 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), [5(a)](#S5.F5.sf1 "In Figure 5 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [5(b)](#S5.F5.sf2 "In Figure 5 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), [6(a)](#S5.F6.sf1 "In Figure 6 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [6(b)](#S5.F6.sf2 "In Figure 6 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"). Removing the signaling traffic has no impact on the upload traffic.
Regarding the download traffic, the video download energy spectra (Fig. [3(d)](#S5.F3.sf4 "In Figure 3 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") [4(d)](#S5.F4.sf4 "In Figure 4 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") [5(d)](#S5.F5.sf4 "In Figure 5 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [6(d)](#S5.F6.sf4 "In Figure 6 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")) are different from their corresponding overall download energy spectra (Fig. [3(c)](#S5.F3.sf3 "In Figure 3 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") [4(c)](#S5.F4.sf3 "In Figure 4 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") [5(c)](#S5.F5.sf3 "In Figure 5 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [6(c)](#S5.F6.sf3 "In Figure 6 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")). Removing signaling traffic from the download traffic has clearly an impact on the download traffic because it modifies the download energy spectra.
Table [2](#S4.T2 "Table 2 ‣ 4.2 Signaling traffic filtering heuristic ‣ 4 Analysis Methodology ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") shows the signaling traffic ratio for all the applications in upload and download. For all the applications, the signaling traffic represents a larger part in the download traffic than the upload traffic.
The upload signaling traffic is only provided by our controlled node to other peers in the Internet. Since our node has high bandwidth capabilities, it serves video to many other peers. Table [1](#S3.T1 "Table 1 ‣ 3.2 Measurement experiments platform ‣ 3 Experiments ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") indicates that the amount of upload traffic is 3 to 6 times larger than the amount of download traffic. The signaling traffic sent by our node to other peers in the Internet counts only for a small part of the overall upload traffic.
The download signaling traffic is provided by other peers in the Internet to our controlled node. Our node just needs to download the video at the video bitrate. The download signaling traffic coming from many other peers counts for a large part of the overall download traffic. This explains the impact of signaling traffic on the download traffic.
To summarize our observations, the signaling traffic has no impact on the upload traffic but it has an impact on the download traffic. In the following, we will discuss the stationnarity of the traffic that will help to better characterize the properties of the P2P IPTV signaling traffic.
### 5.4 Traffic stationnarity
[Refer to caption](/html/0704.3228/assets/x22.png)
\(a\)
Upload: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x23.png)
\(b\)
Upload: video packet traffic
[Refer to caption](/html/0704.3228/assets/x24.png)
\(c\)
Download: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x25.png)
\(d\)
Download: video packet traffic
Figure 7: TCP applications: PPLive. Traffic stationarity for the three equal parts of the traffic. The blue solid line is the first part, the dashed red line is the second part and the dash-dotted green line is the third part of the traffic.
[Refer to caption](/html/0704.3228/assets/x26.png)
\(a\)
Upload: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x27.png)
\(b\)
Upload: video packet traffic
[Refer to caption](/html/0704.3228/assets/x28.png)
\(c\)
Download: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x29.png)
\(d\)
Download: video packet traffic
Figure 8: UDP applications: SOPCast. Traffic stationarity for the three equal parts of the traffic. The blue solid line is the first part, the dashed red line is the second part and the dash-dotted green line is the third part of the traffic.
From all the upload energy spectra (Fig [3(a)](#S5.F3.sf1 "In Figure 3 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") [3(b)](#S5.F3.sf2 "In Figure 3 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), Fig [4(a)](#S5.F4.sf1 "In Figure 4 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") [4(b)](#S5.F4.sf2 "In Figure 4 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), Fig [5(a)](#S5.F5.sf1 "In Figure 5 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") [5(b)](#S5.F5.sf2 "In Figure 5 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), and Fig [6(a)](#S5.F6.sf1 "In Figure 6 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") [6(b)](#S5.F6.sf2 "In Figure 6 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")), we observe a linear increase, starting from $`j = 6`$ for SOPCast, from $`j = 9`$ for PPLive, from $`j = 12`$ for PPStream or $`j = 10`$ for TVAnts. We also show that the linear increase exists in the download traffic (Fig. [3(c)](#S5.F3.sf3 "In Figure 3 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") [4(c)](#S5.F4.sf3 "In Figure 4 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") [5(c)](#S5.F5.sf3 "In Figure 5 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [6(c)](#S5.F6.sf3 "In Figure 6 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")) but it is modified (Fig. [4(d)](#S5.F4.sf4 "In Figure 4 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")) or wasted (Fig. [3(d)](#S5.F3.sf4 "In Figure 3 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") [5(d)](#S5.F5.sf4 "In Figure 5 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") [6(d)](#S5.F6.sf4 "In Figure 6 ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")) when removing signaling traffic.
We already show that signaling traffic has an impact on the download traffic because it count for a larger amount of data. The signaling traffic may also lead to the linear increase in the download energy spectra.
A linear increase indicates a possible long-range dependency of the traffic (LRD). It means that the traffic fluctuates largely and is not predictable. With such traffic fluctuations, it becomes impossible to forecast the traffic behavior or to make network provisioning.
The signaling traffic is used by peers to get the video chunks they need. If the signaling traffic is responsible for LRD, the signaling traffic generates itself the troubles to download the video. In other words, the design of the applications would be not efficient if the signaling traffic generates the long-range dependency of the traffic.
For a P2P network, a LRD traffic indicates, there is no stability in the network traffic. Then, it becomes a hard task to provide QoS parameters (delay, bandwidth, jiiter) to users because networks conditions are always changing.
Regarding P2P IPTV systems, which are delay sensitive, the traffic LRD has to be avoided because it will directly affect and decrease the quality of video reception. For example, under a high churn of peers, each peer has always to discover new peers and to establish new partnerships with other peers to receive the video data chunks. In this case, there would be no stability in the overlay network because of the disruptions in the peers connections and communications. This would lead to non-predictable traffic and long-range dependency of the traffic.
In this section, we want to know if we really observe a long-range dependency of the traffic. To this end, we study the stationnarity of the traffic. We split each trace in three equal parts, and we used the previous wavelet transform method to analyze all the parts of the traffic. We visually control the traffic stability with LDEstimate.
Due to space limitations, we only present one example for TCP applications (PPLive, Fig. [10](#Sx1.F10 "Figure 10 ‣ Appendix ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")) and one example for UDP application (SOPCast, Fig. [11](#Sx1.F11 "Figure 11 ‣ Appendix ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")). The other TCP applications energy spectra are similar to the TCP example (Fig. [10](#Sx1.F10 "Figure 10 ‣ Appendix ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")) and can be found in the appendix.
In each logscale diagram, we plot the three parts of the trace. The blue solid line is the first part of the trace, the dashed red line is the second part and the green dash-dotted line is the third part of the trace. The traffic is stationary if each part of the traffic looks like the other parts and has the same energy level.
For TCP applications (Fig. [10](#Sx1.F10 "Figure 10 ‣ Appendix ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")), the three parts of the energy spectra are similar at small time scales but become different at large time scales (about $`j = 10`$). There is stationnarity in the traffic until $`j = 10`$. The traffic is not stationary beyond $`j = 10`$.
As shown in section [5.2](#S5.SS2 "5.2 TCP applications vs. UDP applications ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), the TCP applications experiment a bump in their energy spectra at time scale $`j = 8`$, whatever the traffic direction or its nature. At this time scale, the traffic is stationary and it demonstrates that the observed energy bumps are essential phenomenon and not simply artifact from non-stationnarity. On the contrary, the linear increase observed from $`j = 9`$ is not a long-range dependency of the traffic.
For UDP applications (Fig. [11](#Sx1.F11 "Figure 11 ‣ Appendix ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")), the three parts of the traffic are similar and increase linearly. The traffic of UDP applications is stationary. The linear increase characterizes a long-range dependency of the UDP applications traffic represented by SOPCast. Removing signaling traffic modifies the linear increase in the SOPCast download traffic. For UDP applications, signaling traffic may lead the to the long-range dependency in the traffic.
In this section, we show an important design difference between TCP and UDP applications. The traffic of UDP applications is stationary and present long-range dependency whereas the traffic of TCP applications is not stationary and does not experiments long-range dependency.
### 5.5 Analysis of the top download flows
[Refer to caption](/html/0704.3228/assets/x30.png)
\(a\)
PPLive Download: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x31.png)
\(b\)
PPLive Download: video packet traffic
[Refer to caption](/html/0704.3228/assets/x32.png)
\(c\)
SOPCast Download: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x33.png)
\(d\)
SOPCast Download: video packet traffic
Figure 9: Top download flows
In the previous experiments, we make our observations based on the aggregate traffic received and sent by our controlled peers situated in our campus network. Our nodes has high bandwidth capacities and they play an important role in duplicating data to a large amount of peers. The high-speed access of our nodes help to get the video efficiently compare to a residential access to the Internet, in which received packets are limited by a smaller download rate.
To extend our previous findings without being strongly related to our network environment, we want to analyze the properties of a single flow instead of observing the aggregate traffic in our contoled peers. Whatever the network environment is, a peer will try to download the video at its bitrate. On the contrary, the number of duplicate flows a peer could upload is directly related to the capacities of the network environment. Thus, we limit the scope of this experiment to the download traffic flows because this is a general observation of the traffic that does not directly depend on the network environment.
For all the traces, we isolated the top peer that sent the biggest amount of data to our nodes. We refer to these resulting flows as top download flows since the data transported by these flows are downloaded by our controlled nodes.
Table [4](#S5.T4 "Table 4 ‣ 5.5 Analysis of the top download flows ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") summarizes the amount of data carried by each top flow for all the applications.
Table 4: Top download flows
<table>
<thead>
<tr>
<th></th>
<th colspan="2">Overall traffic</th>
<th colspan="2">Video traffic</th>
</tr>
</thead>
<tbody>
<tr>
<td></td>
<td>Volume (MB)</td>
<td>#Packets</td>
<td>Volume (MB)</td>
<td>#Packets</td>
</tr>
<tr>
<td>PPLive</td>
<td>106.30</td>
<td>82,428</td>
<td>105.97</td>
<td>76,797</td>
</tr>
<tr>
<td>PPStream</td>
<td>13.21</td>
<td>23,951</td>
<td>11.79</td>
<td>9,809</td>
</tr>
<tr>
<td>SOPCast</td>
<td>61.91</td>
<td>63,054</td>
<td>59.20</td>
<td>47,187</td>
</tr>
<tr>
<td>TVAnts</td>
<td>53.86</td>
<td>41,740</td>
<td>52.13</td>
<td>37,460</td>
</tr>
</tbody>
</table>
We already show in \[[13](#bib.bib13)\] that all the applications do not implement the same mechanisms to download the video. According to the applications, the video can be received from only a few provider peers at the same time or from many peers and the video peers session durations are various. This explains why the amount of data transported by the top flows are different for all the applications.
The top download flows sent by the top peer to our nodes will be analyzed by using wavelet based transform method with LDEstimate, similarly to the previous experiments. Due to space limitation, we only present on Fig. [13](#Sx1.F13 "Figure 13 ‣ Appendix ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), the energy spectra for a single TCP application (PPLive Fig [12(a)](#Sx1.F12.sf1 "In Figure 12 ‣ Appendix ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [12(b)](#Sx1.F12.sf2 "In Figure 12 ‣ Appendix ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")) and for UDP application (SOPCast Fig. [12(c)](#Sx1.F12.sf3 "In Figure 12 ‣ Appendix ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [12(d)](#Sx1.F12.sf4 "In Figure 12 ‣ Appendix ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")). The other TCP applications plots are similar to the presented TCP application and can be found in the appendix.
We notice for the two applications that their video energy spectra look similar to their overall energy spectra. This was expected because these flows are sent by the top contributor peers and transport almost entirely video packets and not signaling packets. Removing signaling traffic on these flows can only have a limited impact, depending on the signaling packets in the flows.
For example, the top download flow of SOPCast transport 15,867 packets of signaling traffic ($`63054 - 47187`$) counting for 2.71 MBytes whereas PPLive top download flow transport only 5,731 signaling packets ($`82428 - 76797`$) counting for 0.33 MBytes.
Regarding TCP applications Fig. [12(a)](#Sx1.F12.sf1 "In Figure 12 ‣ Appendix ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [12(b)](#Sx1.F12.sf2 "In Figure 12 ‣ Appendix ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), until time scale $`j = 10`$, the energy spectra of the top flow look similar to the aggregate traffic. Beyond this time scale, the energy spectra of the top download flow are different from the aggregate traffic because the energy spectra of the top flow are increasing.
With UDP applications, until time scale $`j = 11`$, the energy spectra of the top flow are different from the aggregate traffic. Fig. [12(c)](#Sx1.F12.sf3 "In Figure 12 ‣ Appendix ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") and [12(d)](#Sx1.F12.sf4 "In Figure 12 ‣ Appendix ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis") show an energy bump at time scale $`j = 3`$, then the energy spectra increase slightly from $`j = 4`$ to $`j = 11`$. Beyond $`j = 11`$, we observe the linear increase usually observed for the UDP energy spectra.
In this experiment, we observe that the top flows in the download traffic do not have the same scaling properties as the aggregate download traffic. We did the same experiments for the 10th top download flows (i.e. the 10th flow according to data volume transported). The 10th top flows present the same scaling properties as the top flows. The plots for the 10th top flows can be shown in the appendix.
The aggregate traffic is not only the mix of every single flow. The granularity of the P2P IPTV traffic has to be taken into account when designing P2P IPTV traffic models.
## 6 Results Discussion
In this work, we analyzed the P2P IPTV traffic by using a wavelet based transform method. This allows us to characterize this traffic and to understand its properties and impact on the network. Thanks to our original P2P IPTV traffic analysis, we have many new findings and observations that have to be summarized and discussed.
First of all, we observed that the energy spectra of TCP applications are different from the energy spectra of UDP applications (section [5.2](#S5.SS2 "5.2 TCP applications vs. UDP applications ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")). One of the most relevant difference is the energy bump observed in the spectra of TCP applications at time scale $`j = 8`$ (5.12s), which indicates a possible periodic behavior in the traffic. Intuitively, we could believe these differences come from the two different transport protocols used. However, a 5 seconds periodic behaviors is a very long duration for TCP mechanisms and TCP should not be the responsible of this periodic behavior. With a simple application design difference, the scaling properties of the generated traffic do not have the same impact on the network.
Secondly, for all the applications, the signaling traffic represents a larger part in the download traffic than the upload traffic (section [5.3](#S5.SS3 "5.3 Impact of the signaling traffic ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")). The signaling traffic has clearly an impact on the scaling properties of the download traffic and has no impact on the upload traffic. This observation is important since signaling traffic is necessary to coordinate the data exchanges in such P2P systems. For scalability reasons, the amount of signaling traffic has to be kept as low as possible. The download signaling traffic comes from other peers on the Internet that request the video data. Efforts have to be made to reduce the number of packets sent by the signaling protocol to get the video data and to preserve the scalability of these systems in the network.
Then, the previous observation highlights an important point when modeling P2P IPTV traffic: the download traffic has not the same properties as the upload traffic. The differences between both sides of the traffic (i.e. upload and download) have to be taken into account carefully when designing synthetic traffic generation models.
The generated traffic of TCP applications is not stationary beyond time scale $`j = 10`$. On the contrary, the traffic of UDP applications is stationary. As shown in section [5.4](#S5.SS4 "5.4 Traffic stationnarity ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis"), the stationnarity experiment proves that the signaling traffic of UDP application involves long-range dependency in the download traffic. The UDP application experiments also long-range dependency in the upload traffic. In presence of traffic LRD, the network conditions are always changing and it becomes a hard task to provide QoS parameters as delay for users to get good quality video.
This finding highlights the not so trivial choice of transport protocols for P2P IPTV traffic. It is usually admitted that the non-elastic data transfer -as video- has to rely on UDP but we show that UDP traffic may lead to trouble in the network traffic.
Finally, the aggregate download traffic of P2P IPTV systems has not exactly the same scaling properties as the top download flow (section [5.5](#S5.SS5 "5.5 Analysis of the top download flows ‣ 5 Results Analysis ‣ Technical Report v2 Characterization of P2P IPTV Traffic: Scaling Analysis")). The granularity of the traffic has to be taken into account when designing P2P IPTV traffic models. A P2P IPTV traffic model based only on flows properties would fail to capture the global characteristics of the aggregate traffic. The use of an inappropriate traffic model would lead to wrong results when simulating new architectures with such significant input parameter.
## 7 Conclusion
In this paper, we analyzed network traffic generated by P2P IPTV applications. We performed an extensive measurement campaign during the 2006 FIFA World Cup and we measured the most popular P2P IPTV applications on the Internet. We used wavelet transform based method to study the P2P IPTV traffic at different time scales and to characterize its properties.
Our multiscale traffic analysis show how different are the scaling properties of the TCP and UDP traffics. For all the applications, the signaling traffic has a significant impact on the download traffic but not on the upload traffic. It involves scalability concerns regarding the P2P IPTV signaling protocols used to download the video data. The UDP traffic is stationary and leads to long-range dependency of the traffic. The choice of UDP as transport protocol for non-elastic transfers in P2P networks becomes not so trivial since the traffic LRD indicates that the traffic is not predictable in the network. The scaling properties of the download traffic are different from the upload traffic. The traffic granularity and both traffic directions have to be taken into account to model P2P IPTV traffic accurately.
Currently, we are analyzing the traffic collected during other games and under different network environments to extend our observations. It will allow us to have a finer analysis of our findings and could also help to answer to the open questions introduced by this work. In a long-term work, the characterization of the P2P IPTV traffic will help us to accurately model and simulate such systems.
## References
- \[1\] B. Cohen, “Incentives build robustness in bittorrent,” 2003.
- \[2\] http://www.edonkey2000.com.
- \[3\] http://www.youtube.com.
- \[4\] http://www.pplive.com.
- \[5\] http://www.ppstream.com.
- \[6\] http://www.sopcast.com.
- \[7\] http://www.tvants.com.
- \[8\] X. Zhang, J. Liu, and B. Li, “On large-scale peer-to-peer live video distribution: Coolstreaming and its preliminary experimental results,” in *Proc. MMSP*, 2005.
- \[9\] X. Zhang, J. Liu, B. Li, and T. P. Yum, “Coolstreaming/donet: A data-driven overlay network for peer-to-peer live media streaming,” in *Proc. Infocom*, 2005.
- \[10\] X. Hei, C. Liang, J. Liang, Y. Liu, and K. W. Ross, “Insights into pplive: A measurement study of a large-scale p2p iptv system,” in *Proc. of IPTV Workshop, International World Wide Web Conference*, 2006.
- \[11\]
X. Hei, C. Liang, J. Liang, Y. Liu, and K. W. Ross, “A measurement study of a large-scale p2p iptv system,” to appear in *IEEE Transactions on Multimedia*, 2007.
- \[12\] L. Vu, I. Gupta, J. Liang, and K. Nahrstedt, “Measurement and modeling of a large-scale overlay for multimedia streaming,” in *Proc. of QSHINE’07, International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness*, 2007.
- \[13\] T. Silverston and O. Fourmaux, “Measuring p2p iptv systems,” in *Proc. of NOSSDAV’07, International Workshop on Network and Operating Systems Support for Digital Audio & Video*, 2007.
- \[14\] S. Ali, A. Mathur, and H. Zhang, “Measurement of commercial peer-to-peer live video streaming,” in *Proc. of Workshop in Recent Advances in Peer-to-Peer Streaming*, 2006.
- \[15\] X. Hei, Y. Liu, and K. W. Ross, “Inferring network-wide quality in p2p live streaming systems.” \[Online\]. Available: http://cis.poly.edu/ ross/papers/buffermap.pdf
- \[16\] http://content.lip6.fr/traces/.
- \[17\] http://www.joost.com.
- \[18\] D. Veitch and P. Abry, “Matlab code for the wavelet based analysis of scaling processes.” \[Online\]. Available: http://www.cubinlab.ee.mu.oz.au/$`\sim`$darryl
## Appendix
[Refer to caption](/html/0704.3228/assets/x34.png)
\(a\)
Upload: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x35.png)
\(b\)
Upload: video packet traffic
[Refer to caption](/html/0704.3228/assets/x36.png)
\(c\)
Download: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x37.png)
\(d\)
Download: video packet traffic
Figure 10: PPStream: Traffic stationarity for the three equal parts of the traffic. The blue solid line is the first part, the dashed red line is the second part and the dash-dotted green line is the third part of the traffic.
[Refer to caption](/html/0704.3228/assets/x38.png)
\(a\)
Upload: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x39.png)
\(b\)
Upload: video packet traffic
[Refer to caption](/html/0704.3228/assets/x40.png)
\(c\)
Download: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x41.png)
\(d\)
Download: video packet traffic
Figure 11: TVAnts: Traffic stationarity for the three equal parts of the traffic. The blue solid line is the first part, the dashed red line is the second part and the dash-dotted green line is the third part of the traffic.
[Refer to caption](/html/0704.3228/assets/x42.png)
\(a\)
PPStream Download: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x43.png)
\(b\)
PPStream Download: video packet traffic
[Refer to caption](/html/0704.3228/assets/x44.png)
\(c\)
TVAnts Download: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x45.png)
\(d\)
TVAnts Download: video packet traffic
Figure 12: Top download flows: PPStream: (a) and (b). TVAnts: (c) and (d)
[Refer to caption](/html/0704.3228/assets/x46.png)
\(a\)
PPLive Download: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x47.png)
\(b\)
PPLive Download: video packet traffic
[Refer to caption](/html/0704.3228/assets/x48.png)
\(c\)
SOPCast Download: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x49.png)
\(d\)
SOPCast Download: video packet traffic
[Refer to caption](/html/0704.3228/assets/x50.png)
\(e\)
PPStream Download: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x51.png)
\(f\)
PPStream Download: video packet traffic
[Refer to caption](/html/0704.3228/assets/x52.png)
\(g\)
TVAnts Download: overall packet traffic (signaling and video traffic)
[Refer to caption](/html/0704.3228/assets/x53.png)
\(h\)
TVAnts Download: video packet traffic
Figure 13: 10th top download flows: PPLive: (a) and (b). SOPcast: (c) and (d). PPStream: (e) and (f). TVAnts: (g) and (h)
|
0705.0819
|
cs.NI
|
cyber
|
# Netsukuku topology
http://netsukuku.freaknet.org
AlpT (@freaknet.org)
###### Abstract
In this document, we describe the fractal structure of the Netsukuku topology. Moreover, we show how it is possible to use the QSPN v2 on the high levels of the fractal.
This document is part of Netsukuku.
Copyright ©2007 Andrea Lo Pumo aka AlpT $`<`$alpt@freaknet.org$`>`$. All rights reserved.
This document is free; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
This document is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this document; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
###### Contents
1. [](#S1 "In Netsukuku topology")
1 Preface
2. [](#S2 "In Netsukuku topology")
2 The general idea
3. [](#S3 "In Netsukuku topology")
3 Basic definitions
4. [](#S4 "In Netsukuku topology")
4 Network topology
1. [](#S4.SS1 "In 4 Network topology ‣ Netsukuku topology")
4.1 Fractal topology
1. [](#S4.SS1.SSS1 "In 4.1 Fractal topology ‣ 4 Network topology ‣ Netsukuku topology")
4.1.1 Level 1
2. [](#S4.SS1.SSS2 "In 4.1 Fractal topology ‣ 4 Network topology ‣ Netsukuku topology")
4.1.2 Level n
3. [](#S4.SS1.SSS3 "In 4.1 Fractal topology ‣ 4 Network topology ‣ Netsukuku topology")
4.1.3 Membership
2. [](#S4.SS2 "In 4 Network topology ‣ Netsukuku topology")
4.2 Fractal map
1. [](#S4.SS2.SSS1 "In 4.2 Fractal map ‣ 4 Network topology ‣ Netsukuku topology")
4.2.1 IP v4 and v6
2. [](#S4.SS2.SSS2 "In 4.2 Fractal map ‣ 4 Network topology ‣ Netsukuku topology")
4.2.2 Internal and external map
3. [](#S4.SS2.SSS3 "In 4.2 Fractal map ‣ 4 Network topology ‣ Netsukuku topology")
4.2.3 Bnode map
3. [](#S4.SS3 "In 4 Network topology ‣ Netsukuku topology")
4.3 CIDR routing
5. [](#S5 "In Netsukuku topology")
5 Tracer Packets in high levels
1. [](#S5.SS1 "In 5 Tracer Packets in high levels ‣ Netsukuku topology")
5.1 A gnode is a node
1. [](#S5.SS1.SSS1 "In 5.1 A gnode is a node ‣ 5 Tracer Packets in high levels ‣ Netsukuku topology")
5.1.1 Example of a wandering TP
6. [](#S6 "In Netsukuku topology")
6 QSPN v2 in high levels
1. [](#S6.SS1 "In 6 QSPN v2 in high levels ‣ Netsukuku topology")
6.1 Endless loops
2. [](#S6.SS2 "In 6 QSPN v2 in high levels ‣ Netsukuku topology")
6.2 Route Efficiency Measure
3. [](#S6.SS3 "In 6 QSPN v2 in high levels ‣ Netsukuku topology")
6.3 Flat levels
4. [](#S6.SS4 "In 6 QSPN v2 in high levels ‣ Netsukuku topology")
6.4 Unique flood
7. [](#S7 "In Netsukuku topology")
7 Network dynamics
1. [](#S7.SS1 "In 7 Network dynamics ‣ Netsukuku topology")
7.1 Radar
2. [](#S7.SS2 "In 7 Network dynamics ‣ Netsukuku topology")
7.2 Level 0
3. [](#S7.SS3 "In 7 Network dynamics ‣ Netsukuku topology")
7.3 Level n
4. [](#S7.SS4 "In 7 Network dynamics ‣ Netsukuku topology")
7.4 Hooking phase
5. [](#S7.SS5 "In 7 Network dynamics ‣ Netsukuku topology")
7.5 Gnode hook
8. [](#S8 "In Netsukuku topology")
8 ChangeLog
## 1 Preface
We’re assuming that you already know the basics of the QSPN. If not, read the QSPN document first: \[[1](#bib.bib1)\].
## 2 The general idea
The aim of Netsukuku is to be a (physical) scalable mesh network, completely distributed and decentralised, anonymous and autonomous.
The software, which must be executed by every node of the net, has to be unobtrusive. It has to use very few CPU and memory resources, in this way it will be possible to run it inside low-performance computers, like Access Points, embedded devices and old computers.
If this requirements are met, Netsukuku can be easily used to build a worldwide distributed, anonymous and not controlled network, separated from the Internet, without the support of any servers, ISPs or control authorities.
## 3 Basic definitions
Node
We call *node* any computer that is hooked up to the Netsukuku network.
Rnode
stands for remote node: given a node X, it is any other node directly linked to X, i.e. it’s a neighbour of X.
Map
A map is a file, kept by each node, which contains all the necessary information about the network, f.e. routes and nodes status.
Example:
[Refer to caption](/html/0705.0819/assets/fig/segABC.png)
Figure 1: The nodes A,B and C
A is the rnode of B.
B is the rnode of A and C.
C is the rnode of B.
## 4 Network topology
A simple topology, which doesn’t impose any structure on the network, can be memorised with a simple map. In this map, all the information regarding the nodes of the network have to be memorised. Surely, this kind of map cannot be utilised by Netsukuku, because it would require too much memory. For example, even if we store just one route to reach one node and even if this route costs one byte, we would need 1Gb of memory for a network composed by $`10^{9}`$ nodes (the current Internet).
For this reason, it’s necessary to structure the network in a convenient topology.
### 4.1 Fractal topology
#### 4.1.1 Level 1
First of all we’ll subdivide the network in groups of 256 nodes and we’ll use the following definitions:
Gnode
means group node. It is a group of nodes, i.e. a set of nodes. Each node of the network belongs to just one gnode.
A gnode contains a maximum of 256 nodes.
By writing $`n \in G`$ we mean that the node $`n`$ belongs to the gnode $`G`$.
Bnode
stands for border node. It is a node which belongs to a gnode G, but that is also directly linked to at least one node of another gnode, i.e. some of its rnodes belongs to different gnodes than its.
By writing $`b \in G`$ we mean that the bnode $`b`$ belongs to the gnode $`G`$.
Example:
[Refer to caption](/html/0705.0819/assets/fig/bnode.png)
Figure 2: The bnode A and B, belonging respectively to the gnode G and $`G'`$
$`A \in G`$, A is a node belonging to the gnode G, its rnode is B.
$`B \in G'`$, B is a node belonging to the gnode $`G'`$, its rnode is A.
A is a bnode of G, while B is a bnode of $`G'`$.
#### 4.1.2 Level n
We further subdivide the network topology in *groups of 256 groups of nodes* and we continue to name them as gnode.
At this point, we repeat recursively this subdivision process until we can group all the nodes of the network into a single gnode.
Doing so, we’ve structured the network in $`n + 1`$ levels (from $`0`$ to $`n`$).
In the base level (level 0), there are 256 single nodes.
In the first level (level 1), there are 256 normal gnodes. Each of them contains 256 single nodes.
In the second (level 2), 256 gnodes of level 1 forms a single *group of groups of nodes*.
In the third (level 3), there are 256 groups of 256 groups of 256 groups of 256 nodes.
Continuing in this way, we arrive at the last level (level $`n`$), where there is a single group which contains the whole network.
The QSPN algorithm is able to operate independently on any level, considering each gnode as a single node of level 0. For this reason, we can view the Netsukuku topology as a fractal, where each level is composed by single nodes.
#### Example
Figure [3](#S4.F3 "Figure 3 ‣ Example ‣ 4.1 Fractal topology ‣ 4 Network topology ‣ Netsukuku topology")
<sup>1</sup>
<sup>1</sup>1this figure has been taken from: http://www.ian.org/FX/Plugins.html
is an example of the fractal topology of Netsukuku.
[Refer to caption](/html/0705.0819/assets/fig/fractal_circle.png)
Figure 3: An example of the netsukuku topology structure
In this topology, each gnode contains four nodes, i.e. each group contains four elements. The network is structured in 6 levels.
The red elements, are single nodes (level 0).
Four nodes forms a single group of nodes (level 1).
A single bright green circle is a group of groups of nodes (level 2).
The dark green circles are groups of groups of groups of nodes (level 3).
The dark blue circle are groups of groups of groups of groups of nodes (level 4).
Finally, the bright blue circle is the gnode which contains the whole network (level 5).
#### 4.1.3 Membership
Let’s assign a numeric ID to each (g)gnode, starting from the last level:
1. 1\.
in the last level ($`n`$) there’s only one giant gnode, thus we assign to it the ID “0”. Our global ID will be:
<table>
<tbody>
<tr>
<td></td>
<td>00</td>
<td></td>
</tr>
</tbody>
</table>
2. 2\.
in $`n - 1`$ there are 256 gnodes, which belongs to the gnode 0 of level $`n`$, thus we assign them the IDs from $`0`$ to $`255`$. The global ID becomes:
<table>
<tbody>
<tr>
<td></td>
<td>0⋅i0≤i≤255⋅0𝑖0𝑖2550\cdot i\quad 0\leq i\leq 255</td>
<td></td>
</tr>
</tbody>
</table>
3. 3\.
we repeat the step 2 recursively gaining an ID of this form:
<table>
<tbody>
<tr>
<td></td>
<td>0⋅in−1⋅in−2⋅⋯⋅i00≤ij≤255, 0≤j≤n−1formulae-sequence⋅0subscript𝑖𝑛1subscript𝑖𝑛2⋯subscript𝑖00subscript𝑖𝑗255 0𝑗𝑛10\cdot i_{n-1}\cdot i_{n-2}\cdot\dots\cdot i_{0}\quad 0\leq i_{j}\leq 255,\;0\leq j\leq n-1</td>
<td></td>
</tr>
</tbody>
</table>
4. 4\.
since the last level is always $`0`$, we’ll omit it and we’ll consider only the first $`n`$ levels.
In a network with a maximum of $`2^{32}`$ nodes (the maximum allowed by the ipv4), there would be five levels ($`n = 4`$), where each gnode will be composed by 256 nodes. Therefore, the ID will be in the usual IP form:
<table>
<tbody>
<tr>
<td></td>
<td>0…255⋅0…255⋅0…255⋅0…255⋅⋅⋅0…2550…2550…2550…2550\dots 255\cdot 0\dots 255\cdot 0\dots 255\cdot 0\dots 255</td>
<td></td>
</tr>
</tbody>
</table>
For example, a single node of level 0 of the network is:
<table>
<tbody>
<tr>
<td></td>
<td>3⋅41⋅5⋅12⋅3415123\cdot 41\cdot 5\cdot 12</td>
<td></td>
</tr>
</tbody>
</table>
That said, each gnode of the network belongs to only one combination of gnodes of the various levels. In our previous example we have:
<table>
<tbody>
<tr>
<td></td>
<td>g3=3subscript𝑔33\displaystyle g_{3}=3</td>
<td></td>
</tr>
</tbody>
<tbody>
<tr>
<td></td>
<td>g2=41subscript𝑔241\displaystyle g_{2}=41</td>
<td></td>
</tr>
</tbody>
<tbody>
<tr>
<td></td>
<td>g1=5subscript𝑔15\displaystyle g_{1}=5</td>
<td></td>
</tr>
</tbody>
<tbody>
<tr>
<td></td>
<td>g0=12subscript𝑔012\displaystyle g_{0}=12</td>
<td></td>
</tr>
</tbody>
</table>
where each $`g_{i}`$ corresponds to the gnode ID of the level $`i`$. Note that $`g_{0}`$ is the ID attributed to the single node, at level 0.
### 4.2 Fractal map
The advantages of using a fractal topology are clear.
The node $`N`$, instead of memorising information about each node of the whole network, will keep only that regarding the gnodes where it belongs to. Suppose the node $`N`$ had this ID:
<table>
<tbody>
<tr>
<td></td>
<td>g3⋅g2⋅g1⋅g0⋅subscript𝑔3subscript𝑔2subscript𝑔1subscript𝑔0g_{3}\cdot g_{2}\cdot g_{1}\cdot g_{0}</td>
<td></td>
</tr>
</tbody>
</table>
It will store in memory information regarding:
1. 1\.
the 256 single nodes which belongs to its same gnode of level 1, or in other words, the 256 nodes of the gnode $`g_{1}`$,
2. 2\.
the 256 gnodes gnodes which belongs to its same gnode of level 2, of in other words, the 256 gnodes of the gnode $`g_{2}`$,
3. 3\.
finally, the 256 gnodes which belongs to the gnode $`g_{3}`$.
Note that doing so, the node $`N`$ will be blind to all the other gnodes. For example, it won’t know any information regarding the single nodes which belong to all the other gnodes of level 1 different from $`g_{1}`$.
Even with this lack of knowledge, as we’ll see later, the node $`N`$ is still able to reach all the other nodes of the network. In conclusion, $`N`$ only needs $`256\hspace{0pt}n`$ entries in its map, instead of $`2^{32}`$. To clarify the ideas suppose that each entry costs one byte. In the plain topology we needed $`4\hspace{0pt}G\hspace{0pt}b`$, while in the fractal one we just need $`{{256 \cdot 4}\hspace{0pt}b} = {1\hspace{0pt}K\hspace{0pt}b}`$.
#### 4.2.1 IP v4 and v6
Netsukuku is both compatible with ipv4 and ipv6.
In ipv4 there are a maximum of $`2^{32}`$ IPs, thus we have five levels $`n = 4`$.
In ipv6 there are a maximum of $`2^{128}`$ IPs, thus $`n = 16`$.
#### 4.2.2 Internal and external map
For simplicity we divide the map of the node $`N`$, in the *internal map* and in the *external* one. The internal map contains information regarding the nodes belonging to $`g_{1}`$. The external map describes all the other levels of the topology.
#### 4.2.3 Bnode map
The bnode map of the node $`N`$ contains the information regarding the bnodes of each level where $`N`$ belongs. Some examples to clarify the ideas:
suppose that $`N = {g_{3} \cdot g_{2} \cdot g_{1} \cdot g_{0}}`$
- •
a bnode of level 0 is a single node linked with two nodes of two different gnodes of level 1.
- •
the bnodes of level 0, known by $`N`$, are only that which belong to the gnode $`g_{0}`$. They are all the nodes of $`g_{0}`$ which are linked to at least a gnode different from $`g_{1}`$.
### 4.3 CIDR routing
The QSPN, for each level, will build the routes necessary to connect each (g)node to all the other (g)nodes of the same level. The routes will be saved in the maps of each node.
If the node $`N = {g_{3} \cdot g_{2} \cdot g_{1} \cdot g_{0}}`$ wants to reach a node $`M`$ which belongs to different gnodes, f.e. $`M = {g_{3} \cdot g_{2} \cdot h_{1} \cdot h_{0}}`$, it will add a CIDR\[[3](#bib.bib3)\] route in the routing table of the kernel:
*all the packets whose destination is $`{g_{3} \cdot g_{2} \cdot h_{1} \cdot 0}\hspace{0pt}\ldots\hspace{0pt}255`$ will be forwarded to the gateway $`X`$*.
We’ll see later how the gateway $`X`$ is chosen.
## 5 Tracer Packets in high levels
In the QSPN document \[[1](#bib.bib1)\], we’ve seen how a Tracer Packet works in a network composed by single nodes, i.e. a gnode of level 0.
We’ll now study its way of working on higher levels.
### 5.1 A gnode is a node
In the abstract sense a single node is an entity which:
1. 1\.
receives input from its links
2. 2\.
stores it in its memory
3. 3\.
computes it
4. 4\.
and sends the output of the computation over some of its links
Thus any other entity which performs the same operations can be thought as a single node.
A gnode $`G`$ can act as a single node too.
1. 1\.
A bnode $`I`$, which belongs to $`G`$, receives an input from its links. We call $`I`$ the *ingress* (b)node.
2. 2\.
this input is flooded to all the nodes, of any level, of the gnode. The nodes will memorize the information contained in the input.
Note that the flood is not a TP. The flooded pkt will be received only once by each node.
3. 3\.
A bnode $`O`$, of the same gnode, which is different from $`I`$, receives the flooded input and computes it. We call $`O`$ the *egress* (b)node.
4. 4\.
The bnode $`O`$ sends the output of its computation to its external links, i.e. avoiding those links which connect it to nodes of $`G`$ or to the same gnode which sent the input to $`I`$.
#### 5.1.1 Example of a wandering TP
Consider the network in figure [4](#S5.F4 "Figure 4 ‣ 5.1.1 Example of a wandering TP ‣ 5.1 A gnode is a node ‣ 5 Tracer Packets in high levels ‣ Netsukuku topology").
[Refer to caption](/html/0705.0819/assets/fig/qspn_g3.png)
Figure 4: The gnodes $`G_{1}`$, $`G_{2}`$ and $`G_{3}`$
$`G_{1}`$, $`G_{2}`$, $`G_{3}`$ are gnodes of level 1. $`A_{1}`$ and $`A_{2}`$ belong to $`G_{1}`$. $`B_{1}`$ and $`B_{2}`$ belong to $`G_{2}`$. $`C_{1}`$ belongs to $`G_{3}`$.
Suppose the node $`A_{1}`$ sends a Tracer Packet in level 1
<sup>2</sup>
<sup>2</sup>2Note that any node can send a TP in any level. In this case, we are considering $`A_{1}`$, which is a bnode, to simplify the example
. The following will happen:
1. 1\.
The TP is flooded in $`G_{1}`$.
2. 2\.
$`A_{2}`$ receives the TP and appends in it the ID of the gnode $`G_{1}`$.
3. 3\.
$`A_{2}`$ sends the TP to $`B_{1}`$.
4. 4\.
$`B_{1}`$ receives it, updates its maps and floods it in $`G_{2}`$.
5. 5\.
All the node belonging to $`G_{2}`$ will receive the TP, updating their maps.
6. 6\.
This same procedure is reiterated from step 2, i.e. $`B_{2}`$ receives the TP, appends the ID of $`G_{2}`$ and so on until $`C_{1}`$ receives it.
7. 7\.
$`C_{1}`$, noticing that its gnode hasn’t any links to other gnodes than $`G_{2}`$, will bounce back the TP to $`B_{2}`$ and at the same time will flood $`G_{3}`$.
8. 8\.
The TP, with the same procedure, will return back to $`A_{1}`$, completing the TP cycle.
## 6 QSPN v2 in high levels
In order to use the $`Q^{2}`$ (QSPN v2) in high levels, we need to be sure that a TP, flooded inside a lower gnode, will reach once and only once all the nodes of the same gnode. Moreover, a good metric needs to be defined for the high levels: what is the rtt (Round-Trip Time) and bandwidth capacity of the link between two gnodes, how is it measured?
### 6.1 Endless loops
Consider the situation in figure [5](#S6.F5 "Figure 5 ‣ 6.1 Endless loops ‣ 6 QSPN v2 in high levels ‣ Netsukuku topology").
[Refer to caption](/html/0705.0819/assets/fig/3bnodes.png)
Figure 5: Three bnodes, forming a cycle
A and B are bnodes of the node $`G_{1}`$, while $`C`$ is a bnode of the gnode $`G_{2}`$. Suppose C sends a TP to B. B floods it inside $`G_{1}`$, thus $`A`$ receives it. At this point, $`A`$ sends the packet to all its external links, and thus to $`C`$. $`C`$ will send the packet again to $`B`$ and the cycle will continue.
This situation can be avoided if an ingress bnode, before forwarding a packet to a an external gnode $`F`$, checks if the packet has already traversed $`F`$ itself. If it has, the bnode won’t forward it to $`F`$.
### 6.2 Route Efficiency Measure
We will refer to REM (Route Efficiency Measure), as a value characterising the quality of a route. REM can be calculated in various ways, f.e. by taking in account the total rtt and the bw capacity of the route. We denote the REM of a route $`r`$ as $`R\hspace{0pt}E\hspace{0pt}M\hspace{0pt}{(r)}`$.
### 6.3 Flat levels
From the point of view of the QSPN v2, the levels are “flattened”, because the propagation of CTPs
<sup>3</sup>
<sup>3</sup>3Continuous Tracer Packet, see \[[1](#bib.bib1)\]
ignore the subdivisions of the network in gnodes and levels. The structure of the network remains unchanged, subdvided fractally in gnodes, but the exploration of the CTP doesn’t. A CTP doesn’t consider a gnode as a single, homogenous entity. It propagates itself between the single nodes, tracing a precise route formed by single hops, until it is considered interesting. In this way every node will have its own personal route to reach a specific gnode.
The memory limits are respected, because the CTP, once it jumped over the border of a gnode, deletes the specific details that were useful by the nodes of the gnode.
We’ll know describe the rules of the Flat levels.
Suppose we want to explore the level $`n \geq 1`$ (we already know how to explore $`n = 0`$). Let $`G_{1},\ldots,G_{r}`$ be the gnode of level $`n`$. The generic rule of the QSPN v2 in high levels is:
> When an ingress bnode $`b`$ of $`G`$ receives a CTP from a neighbouring bnode of $`H`$, it appends in the packet its IP. The packet, called *Locked Tracer Packet* is then flooded inside $`G`$. The LTP of level $`n`$, is a packet that is propagated with the same rules of the CTP, i.e if it isn’t interesting it’s dropped, but that isn’t updated while it explores the levels inferior to $`n`$. When the egress bnode $`b'`$, of $`G`$ receives the LTP, it changes it in a CTP, appends the ID of $`G`$ and forwards it to all its neighbouring gnodes.
Detailed rules:
1. 1\.
When exploring the level $`n`$, each inferior level must been already explored.
To accomplish this, it sufficies that a node, before sending/forwarding a CTP of level $`n`$ has already sent/forwarded at least a CTP of level $`n - 1`$. If it hasn’t, it will queue the CTP of level $`n`$.
2. 2\.
Suppose that the ingress bnode $`b`$ belonging to a gnode $`G`$ of level $`n`$, has received a CTP of the same level, sent by the gnode $`G'`$. The following will happen: $`b`$ makes copy of the CTP, marking it as a LTP, appends in it its IP and floods it in $`G`$. If $`b`$ is also linked to a gnode different from $`G'`$, it will respect the rule [3](#S6.I1.i3 "item 3 ‣ 6.3 Flat levels ‣ 6 QSPN v2 in high levels ‣ Netsukuku topology") for egress bnodes.
3. 3\.
Suppose that the egress bnode $`b'`$ of $`G`$ receives the LTP sent by $`b`$ (see above). $`b'`$ transforms the LTP in a CTP, deletes the IP added by $`b`$ and sets (in the TP) the REM of $`G\rightarrow G'`$ as:
<table>
<tbody>
<tr>
<td></td>
<td>REM(G→G′):=REM(b′→b)assign𝑅𝐸𝑀→𝐺superscript𝐺′𝑅𝐸𝑀→superscript𝑏′𝑏REM(G\rightarrow G^{\prime}):=REM(b^{\prime}\rightarrow b)</td>
<td></td>
</tr>
</tbody>
</table>
Finally, it forwards the CTP to all its external rnodes.
4. 4\.
A node $`n`$ of $`G`$, uses the received LTP to learn that $`b`$ is a bnode bordering on $`G'`$ and to find out the route of level $`n`$ contained in the packet. It considers the REM of the route to reach $`G'`$ equal to
<table>
<tbody>
<tr>
<td></td>
<td>REM(n→b)𝑅𝐸𝑀→𝑛𝑏REM(n\rightarrow b)</td>
<td></td>
</tr>
</tbody>
</table>
in other words, it saves in its map that $`{R\hspace{0pt}E\hspace{0pt}M\hspace{0pt}{({n\rightarrow G})}}:={R\hspace{0pt}E\hspace{0pt}M\hspace{0pt}{({n\rightarrow b})}}`$.
$`n`$ forwards the LTP to its rnodes without modifying it.
5. 5\.
The LTP respects the same rule of the QSPN v2: it is forwarded by a node only if it is carries interesting information, otherwise it is dropped. A node $`n`$ consider the LTP interesting if one of the following conditions
<sup>4</sup>
<sup>4</sup>4this isn’t the complete list of conditions
is met:
- •
The LTP contains the IP of a bnode $`b`$, which wasn’t already known by $`n`$.
- •
The LTP contains a bnode already known by $`n`$, but that borders on a new gnode $`g`$: with this LTP, the node $`n`$ learns that it can reach $`g`$ by passing through the bnode.
- •
The LTP contains the information of the death of a bnode which was used by $`n`$ to reach some gnodes.
- •
The LTP contains a new gnode, which was previously unknown.
- •
The LTP contains the information of the death of a gnode.
- •
The LTP contains an improved route to reach a gnode.
Note: the first three conditions are used by the nodes to build and update the bnode map.
6. 6\.
Recall the situation of rule [3](#S6.I1.i3 "item 3 ‣ 6.3 Flat levels ‣ 6 QSPN v2 in high levels ‣ Netsukuku topology").
When the value $`R\hspace{0pt}E\hspace{0pt}M\hspace{0pt}{({b'\rightarrow b})}`$ changes considerably, both $`b`$ and $`b'`$ sends a CTP of level $`n`$ to their external nodes
<sup>5</sup>
<sup>5</sup>5A CTP of level $`n - 1`$ tells $`b`$ and $`b'`$ of the REM change
. The CTP contains the new $`R\hspace{0pt}E\hspace{0pt}M`$ value. Every node which used $`G`$ as hop of some routes, will consider the CTP interesting.
This rule permits the update of high levels.
7. 7\.
When a bnode $`b`$ (of any level)
<sup>6</sup>
<sup>6</sup>6a bnode $`b^{\operatorname{\prime\prime}}`$, which is a gnode of level $`l \geq 1`$, loses its external link to the gnode $`H`$ of level $`l + 1`$, when all its bnodes of level $`l - 1`$ loses their link to $`H`$. This is a recursive definition.
loses one of its external links of level $`n`$, a CTP is sent in the level $`n - 1`$. The CTP contains the information regarding the lost link. The CTP is forwarded by all the (g)nodes that used the bnode $`b`$ in one of their saved routes to reach the lost link.
If $`b`$ was the unique bnode of its gnode $`G`$ bordering to gnode $`G'`$ of level $`n`$, then the link $`G\leftrightarrow G'`$ becomes broken. In this case a CTP of level $`n`$ is sent by $`G'`$ and by the other bnodes of $`G`$
<sup>7</sup>
<sup>7</sup>7they will know of the broken link when receiving the CTP of level $`n - 1`$
.
A dying bnode is equivalent to a bnode which loses all its external links. The only difference is that a CTP of level 0 is sent to inform the nodes of its gnode.
We’ll now describe some rules by giving an example (see figure [6](#S6.F6 "Figure 6 ‣ 6.3 Flat levels ‣ 6 QSPN v2 in high levels ‣ Netsukuku topology")). For simplicity, we’ll use the IP notation: $`11.22.33`$ indicates the single node $`33`$ belonging to the gnode $`22`$, belonging to the ggnode $`11`$. Using the symbolic notation: $`11.22.33 \in 11.22 \in 11`$. We are also assuming that the routes are symmetric.
[Refer to caption](/html/0705.0819/assets/fig/segG3.png)
Figure 6: Level 3
*CASE 1: A new gnode join.*
We are exploring the level 3, which is formed by the gnodes $`11,\;22,\;33,\;44`$. The level 2, of each gnode, has been already explored.
- •
The gnode $`44`$ has just created the link to the gnode $`33`$. The new physical link is maintained by the two single bnodes $`33.33.33,\;44.44.44`$.
- •
The bnode $`33.33.33`$ creates a CTP of level 3, appends in it the ID “$`33`$” and sends it to $`44.44.44`$.
- •
The bnode $`44.44.44`$ receives it.
- –
It reflects back a new CTP to $`33.33.33`$, appending in it the ID “$`44`$”.
- –
It appends in the received CTP, its IP, marks it as a LTP and sends it to its gnode. The LTP contains the path $`33\rightarrow 44.44.44`$.
- \*
The node $`44.44.x`$, receiving the LTP, learns the following: $`44.44`$ is a bnode of level 2 that can be used to reach $`33`$, and $`44.44.44`$ is a bnode of its own gnode which borders on $`33`$. It also learns its own REM for the route to $`33`$:
<table>
<tbody>
<tr>
<td></td>
<td>REM(44.44.x→33):=REM(44.44.x→44.44.44)REM(44.44.x\rightarrow 33):=REM(44.44.x\rightarrow 44.44.44)</td>
<td></td>
</tr>
</tbody>
</table>
$`44.44.x`$ continues to forward the LTP (without modifying it).
- \*
The LTP reaches the node $`44.y.z`$, node of $`44.y`$. $`44.y.z`$, from the LTP learns that: $`44.44`$ is a bnode of level 2 that can be used to reach $`33`$. Since the level $`2`$ has been already explored, $`44.y.z`$ already knows a route to reach $`44.44`$.
- \*
The LTP having reached all the nodes of $`44`$ ceases to being forwarded.
- •
The bnode $`33.33.33`$ receives the reflected CTP sent by $`44.44.44`$.
- –
It appends in it its IP, marks it as a LTP and sends it to its gnode.
- \*
The LTP is propagated in $`33`$ (in the same way of the previous LTP).
- •
The bnode $`33.r.s`$, which borders on $`22`$, receives the LTP.
- –
It modifies it in a CTP: it removes the IP $`33.33.33`$ and appends the ID $`33`$. The CTP is now $`44\rightarrow 33`$. Finally, it sets the first REM of the CTP:
<table>
<tbody>
<tr>
<td></td>
<td>REMCTP(33↔︎44):=REM(33.r.s↔︎33.33) see note REM_{CTP}(33\leftrightarrow 44):=REM(33.r.s\leftrightarrow 33.33)\;\;\;\textrm{ see note }</td>
<td></td>
</tr>
</tbody>
</table>
The CTP is then sent to $`22.22.22`$, bnode of $`22`$.
- •
The bnode $`22.22.22`$ receives the CTP. It sends a LTP in $`22`$.
- •
The bnode $`22.t.u`$, which borders on $`11`$, receives the LTP. It appends $`22`$ in it and sends it to $`11`$. The CTP is now: $`44\rightarrow 33\rightarrow 22`$.
- •
A bnode of $`11`$ receives it, and reflect it to $`22`$. It sends also the LTP to $`11`$.
- •
…
- •
The reflected CTP is finally received by the node $`44.44.44`$, which sends the LTP to $`44`$ and reflects the CTP to $`33.33.33`$. The bnode $`33.33.33`$, drops immediately the CTP, because it doesn’t contain any interesting information.
- •
the exploration is completed.
### 6.4 Unique flood
Suppose that a TP has been flooded inside the gnode $`G`$. Suppose also that the node $`n \in G`$ receives two duplicate packets.
The $`Q^{2}`$ instructs the node $`n`$ to keep forwarding only the interesting packets. A packet, which is a perfect copy of a packet already received, is always uninteresting. Therefore, the node $`n`$ will drop the second copy of the received TP.
However, in this case the node $`n`$ should not consider the REM values saved in the TP, because two TPs, which have crossed the same gnodes in the same order, might have different REM values.
In conclusion, whenever two or more TPs, which have crossed the same high level route, are received by a node of $`G`$, only one of them will be forwarded. In this way, the successive nodes will receive only one copy of the same packet.
## 7 Network dynamics
When a part of the network changes considerably, the maps of the involved levels must be updated.
### 7.1 Radar
Every node has its own radar, which periodically sends a broadcast request to all its (physical) near nodes. By collecting the replies, the radar is able to determine the active rnodes of the node and the quality of its links.
### 7.2 Level 0
In level 0, a CTP is sent every time a node joins the network, dies or every time the change of the quality of a link exceeds a predefined delta value. The CTP is also is restricted to the gnode where it has been originated: a bnode won’t send it to external nodes.
When a node joins, it won’t send a CTP, only its rnodes will. Their CTP will be directed to the node. More formally:
if the node $`n`$ joins, that is if the node $`n`$ creates a link with the nodes $`r_{1},\ldots,r_{n}`$, with $`n \geq 1`$, then a CTP will be sent by each rnode $`r_{i}`$ *only* to $`n`$. This means that if $`r_{j}`$ is connected to a node $`s`$, when $`n`$ joins, $`r_{j}`$ will send the CTP only to $`n`$ and not to $`s`$.
This saves the propagation of two CTP in the following situation:
<table>
<tbody>
<tr>
<td></td>
<td>…↔︎A↔︎B↔︎C↔︎…↔︎…𝐴↔︎𝐵↔︎𝐶↔︎…\dots\leftrightarrow A\leftrightarrow B\leftrightarrow C\leftrightarrow\dots</td>
<td></td>
</tr>
</tbody>
</table>
suppose that the node $`B`$ joins. As a consequence of the rule we’ve described, the node $`C`$ will send a CTP to $`B`$ and $`A`$ to $`B`$, thus only two distinct CTP are generated. Their path is $`A\rightarrow B\rightarrow C\rightarrow\ldots`$ and the reverse. If instead the node $`B`$ sends a CTP to $`C`$ and then $`A`$ to $`B`$, two distinct CTP will explore the same verse: $`B\rightarrow C\rightarrow\ldots`$ and $`A\rightarrow B\rightarrow C\rightarrow\ldots`$, the same is for the reverse, thus, in total, four distinct CTP are propagated.
Let $`A\overset{l}{\leftrightarrow}B`$ be a link. If its quality changes $`B`$ will send a CTP to $`A`$ and vice-versa.
When a node dies, all its rnodes will send a CTP to all their rnodes. The CTP will include, as the first hop, the ID of the dead node, with a flag which indicates its death. For example:
<table>
<tbody>
<tr>
<td></td>
<td>A↔︎B↔︎C↔︎…↔︎𝐴𝐵↔︎𝐶↔︎…A\leftrightarrow B\leftrightarrow C\leftrightarrow\dots</td>
<td></td>
</tr>
</tbody>
</table>
if $`A`$ dies, then $`B`$ will send the following CTP to $`C`$: $`\overset{+}{A}\rightarrow B`$
In order to prevent false positives, the nodes won’t immediately send the CTP, but will wait a small amount of time. Only if the change persists, they will send it.
### 7.3 Level n
The dynamics for the update of high levels are mainly governed by rule [6](#S6.I1.i6 "item 6 ‣ 6.3 Flat levels ‣ 6 QSPN v2 in high levels ‣ Netsukuku topology") and [7](#S6.I1.i7 "item 7 ‣ 6.3 Flat levels ‣ 6 QSPN v2 in high levels ‣ Netsukuku topology") of flat levels (see [6.3](#S6.SS3 "6.3 Flat levels ‣ 6 QSPN v2 in high levels ‣ Netsukuku topology")). In this paragraph, we’ll specify some details.
Rule [6](#S6.I1.i6 "item 6 ‣ 6.3 Flat levels ‣ 6 QSPN v2 in high levels ‣ Netsukuku topology") says: “when the value $`R\hspace{0pt}E\hspace{0pt}M\hspace{0pt}{({b'\rightarrow b})}`$ changes considerably, a new CTP is sent”. By considerably we mean that the difference of the current REM value with the previous one exceedes a predefined threshold. More precisely: let $`A\rightarrow B`$ be a route of level $`n`$. If
<table>
<tbody>
<tr>
<td></td>
<td>|REMnow(A→B)−REMprev(A→B)|>Δn𝑅𝐸subscript𝑀now→𝐴𝐵𝑅𝐸subscript𝑀𝑝𝑟𝑒𝑣→𝐴𝐵subscriptΔ𝑛|REM_{\textrm{now}}(A\rightarrow B)-REM_{prev}(A\rightarrow B)|>\Delta_{n}</td>
<td></td>
</tr>
</tbody>
</table>
then the route has changed considerably. $`\Delta_{n}`$ is proportional to $`n`$, in this way the nodes will be more sensible to minor changes of lower levels and they will consider only relevant changes of higher levels.
Also in high levels, a bnode won’t immediately send a new CTP, but it will delay it for a small amount of time.
### 7.4 Hooking phase
A new node joins the network when it has been able to create at least one physical link to an active Netsukuku node and when it has correctly executed the hooking procedure. In this paragraph, we describe loosely the hooking phase of a new node.
Suppose that the node $`n`$ has established a physical link to at least one Netsukuku node. In order to become an active Netsukuku node, $`n`$ has to *hook* to its rnodes.
During the hook, $`n`$ will exchange vital information with its rnodes, it will choose its new IP and it will finally become part of a gnode.
The hook procedure is formed by these general steps:
1. 1\.
The node $`n`$ chooses an IP in the range of $`10.0.0.1 \leq {I\hspace{0pt}P} \leq 10.0.0.255`$.
2. 2\.
It launches the first radar to see what its rnodes are. If not a single node is found, it creates a new gnode and ends hooking phase.
3. 3\.
At this point, $`n`$ asks to its nearer rnode the list of all the available free nodes presents inside the gnode of the rnode.
If the rnode rejects the request (the gnode might be full), the node $`n`$ contacts another rnode.
4. 4\.
$`n`$ chooses an IP from the received list of free nodes and sets it on its network interface.
5. 5\.
$`n`$ will then download the external map from the same rnode. Looking at the external map, it will be able to determine if it has to create a new gnode. If it has, it creates it and ends the hooking.
6. 6\.
$`n`$ gets the internal and the bnode map from the same rnode.
7. 7\.
$`n`$ launches a second radar and updates its routing table.
8. 8\.
All the rnodes of $`n`$ send a CTP to update the maps.
### 7.5 Gnode hook
When a node creates a new gnode, it will choose a random gnode ID, and thus a random ip.
Suppose that two isolated gnodes get the same gnode ID. When they will be linked, they’ll enter in conflict.
The solution to this problem is to let each new gnode hook as a normal node would. You can find more information about this in the NTK_RFC 001\[[4](#bib.bib4)\].
## 8 ChangeLog
- •
`March 2007`
- –
Description of the Flat levels (sec. [6.3](#S6.SS3 "6.3 Flat levels ‣ 6 QSPN v2 in high levels ‣ Netsukuku topology"))
- –
Section [7.2](#S7.SS2 "7.2 Level 0 ‣ 7 Network dynamics ‣ Netsukuku topology") “Network dynamics - Level 0” expanded.
- –
Section [7.3](#S7.SS3 "7.3 Level n ‣ 7 Network dynamics ‣ Netsukuku topology") “Network dynamics - Level n” updated: the references to the pre-Flatlevels REM metric have been removed.
- •
`October 2006`
Initial release.
## References
- \[1\] QSPN document: http://netsukuku.freaknet.org/doc/main_doc/qspn.pdf
- \[2\] Netsukuku website: http://netsukuku.freaknet.org/
- \[3\] CIDR routing: http://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing
- \[4\] NTK_RFC 001: http://lab.dyne.org/Ntk_gnodes_contiguity
`^_^`
|
0705.2819
|
cs.NI
|
cyber
| "# An Autonomous Distributed Admission Control Scheme for IEEE 802.11 DCF\n\nPreetam Patil\n\nVarsha(...TRUNCATED) |
0705.1939
|
cs.NI
|
cyber
| "# Towards Informative Statistical Flow Inversion\n\nRichard Clegg\n\nHamed Haddadi\n\nRaul Landa\n\(...TRUNCATED) |
0705.3740
|
cs.CR
|
cyber
| "# Optimal Iris Fuzzy Sketches\n\nJ. Bringer, H. Chabanne, G. Cohen, B. Kindarji and G. Zémor J. Br(...TRUNCATED) |
0704.1068
|
cs.NI
|
cyber
| "Fast paths in large-scale dynamic road networks\n\nGiacomo Nannicini<sup>1,2</sup>, Philippe Baptis(...TRUNCATED) |
0706.0430
|
cs.CR
|
cyber
| "<sup>1</sup>\n\n<sup>1</sup>institutetext: Computer Laboratory\nJJ Thomson Avenue, Cambridge CB3 0F(...TRUNCATED) |
End of preview. Expand
in Data Studio
arXiv Papers Dataset
This dataset contains 112,485 scientific papers from arXiv, converted to markdown format.
Dataset Description
This dataset includes arXiv papers from three major domains: biology, nuclear physics, and cybersecurity. Each paper has been downloaded from arXiv, converted from HTML to markdown format, and enriched with metadata.
Dataset Structure
The dataset contains the following columns:
- arxiv_id: The arXiv identifier (e.g., "1234.56789" or "cs.CR/0123456")
- arxiv_category: The specific arXiv category (e.g., "q-bio.QM", "nucl-th", "cs.CR")
- category: The broad domain label (biology, nuclear, or cyber)
- text: The full text of the paper in markdown format
Dataset Statistics
Total Examples: 112,485
Category Distribution:
- nuclear: 44,990 (40.0%)
- cyber: 36,693 (32.6%)
- biology: 30,802 (27.4%)
Top 10 arXiv Categories:
- nucl-th: 33,653 (29.9%)
- cs.CR: 22,399 (19.9%)
- cs.NI: 13,819 (12.3%)
- nucl-ex: 11,337 (10.1%)
- q-bio.PE: 7,573 (6.7%)
- q-bio.NC: 6,660 (5.9%)
- q-bio.QM: 5,388 (4.8%)
- q-bio.BM: 3,164 (2.8%)
- q-bio.MN: 2,275 (2.0%)
- q-bio.GN: 1,958 (1.7%)
Average Text Length: 66,257 characters
Usage
Loading the Text Dataset
from datasets import load_dataset
# Load the dataset
dataset = load_dataset("erol-AE/arXiv-dual-use")
# Access examples
print(dataset['train'][0])
# Filter by category
biology_papers = dataset['train'].filter(lambda x: x['category'] == 'biology')
Data Source
Papers were collected from arXiv.org and processed using:
- HTML download from arXiv and ar5iv.labs.arxiv.org
- HTML to Markdown conversion using Pandoc
- Metadata sourced from Kaggle's "arXiv Papers" dataset
Citation
If you use this dataset, please cite arXiv:
@misc{arxiv,
title = {arXiv},
howpublished = {\url{https://arxiv.org/}}
}
License
The papers in this dataset are subject to arXiv's terms of use and the licenses specified by individual authors. Please refer to each paper's arXiv page for specific licensing information.
- Downloads last month
- 91