<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1665-6423</journal-id>
<journal-title><![CDATA[Journal of applied research and technology]]></journal-title>
<abbrev-journal-title><![CDATA[J. appl. res. technol]]></abbrev-journal-title>
<issn>1665-6423</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Ciencias Aplicadas y Tecnología]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1665-64232017000600513</article-id>
<article-id pub-id-type="doi">10.1016/j.jart.2017.05.009</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[BiT-SiEm: A packet-level simulation and emulation platform for BitTorrent]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Aguilar-Gonzalez]]></surname>
<given-names><![CDATA[Alberto]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Lozoya]]></surname>
<given-names><![CDATA[Camilo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ventura-Molina]]></surname>
<given-names><![CDATA[Carlos]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Castelló]]></surname>
<given-names><![CDATA[Rodolfo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Román-Flores]]></surname>
<given-names><![CDATA[Armando]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Tecnologico de Monterrey  ]]></institution>
<addr-line><![CDATA[Chihuahua ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2017</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2017</year>
</pub-date>
<volume>15</volume>
<numero>6</numero>
<fpage>513</fpage>
<lpage>523</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1665-64232017000600513&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1665-64232017000600513&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1665-64232017000600513&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract Simulation and emulation have been used by researchers to develop new network protocols and to test, modify and optimize existing ones; these experiments must imitate the heterogeneous nature of the Internet in a controllable environment suitable to answer what-if questions. BitTorrent is not the exception. In this paper, we present a simulation platform that allows the interaction of simulated and emulated peers; the BitTorrent protocol is implemented in the simulator with a high degree of detail in which any genuine BitTorrent implementation would seamlessly fit into the platform. To evaluate our platform, several experiments were completed with thousands of peers; then, we compared the results of these tests with two mathematical models to corroborate its correctness.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[BitTorrent simulation]]></kwd>
<kwd lng="en"><![CDATA[BitTorrent emulation]]></kwd>
<kwd lng="en"><![CDATA[Packet-level simulation]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aguilar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ege]]></surname>
<given-names><![CDATA[R. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Makki]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Bustos]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Enabling peer cooperation in private local area networks using BitTorrent]]></source>
<year>2007</year>
<conf-name><![CDATA[ 12thIEEE symposium on computers and communications]]></conf-name>
<conf-loc> </conf-loc>
<page-range>615-22</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bharambe]]></surname>
<given-names><![CDATA[A. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Herley]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Padmanabhan]]></surname>
<given-names><![CDATA[V. N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Analyzing and improving BitTorrent performance]]></source>
<year>2005</year>
<publisher-name><![CDATA[Microsoft Research]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barham]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Dragovic]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Fraser]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Hand]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Harris]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Ho]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Xen and the art of virtualization]]></article-title>
<source><![CDATA[Operating Systems Review ACM]]></source>
<year>2003</year>
<volume>37</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>164-77</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bindal]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Cao]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Chan]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Medved]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Suwala]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Bates]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Improving traffic locality in BitTorrent via biased neighbor selection]]></source>
<year>2006</year>
<conf-name><![CDATA[ 26thIEEE proceedings - international conference on distributed computing systems]]></conf-name>
<conf-date>2006</conf-date>
<conf-loc> </conf-loc>
<page-range>66</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="">
<source><![CDATA[BitTorrent..]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="">
<source><![CDATA[BitTorrent speci&#64257;cation]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bustos]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Aguilar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Makki]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Ege]]></surname>
<given-names><![CDATA[R. K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Multicast-P2P content distribution in large-scale enterprise networks]]></source>
<year>2008</year>
<conf-name><![CDATA[ IEEE symposium on computers and communications. ISCC]]></conf-name>
<conf-date>2008</conf-date>
<conf-loc> </conf-loc>
<page-range>487-94</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Chu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[A lightweight emulator for BitTorrent-like file sharing systems]]></source>
<year>2010</year>
<conf-name><![CDATA[ IEEE international conference on communications (ICC)]]></conf-name>
<conf-date>2010</conf-date>
<conf-loc> </conf-loc>
<page-range>1-5</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cohen]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Incentives build robustness in BitTorrent. pp. 68-72. Work-shop on economics of peer-to-peer systems]]></source>
<year>2003</year>
<volume>6</volume>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dike]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[A user-mode port of the Linux kernel]]></source>
<year>2000</year>
<conf-name><![CDATA[ 4thannual Linux showcase &amp; conference]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dischinger]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Haeberlen]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gummadi]]></surname>
<given-names><![CDATA[K. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Saroiu]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Characterizing residential broadband networks]]></source>
<year>2007</year>
<conf-name><![CDATA[ 7thACM SIGCOMM conference on Internet measurement, IMC&#8217;07]]></conf-name>
<conf-loc> </conf-loc>
<page-range>43-56</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Erazo]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[SVEET! A scalable virtualized evaluation environment for TCP]]></source>
<year>2009</year>
<conf-name><![CDATA[ 5thinternational conference on testbeds and research infrastructures for the development of networks and communities]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Eger]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Hoßfeld]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Binzenhöfer]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Kunzmann]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Efficient simulation of large-scale P2P networks: Packet-level vs. flow-level simulations]]></source>
<year>2007</year>
<conf-name><![CDATA[ secondworkshop on use of P2P, GRID and agents for the development of content networks]]></conf-name>
<conf-loc> </conf-loc>
<page-range>9-16</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Grau]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Maier]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Herrmann]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Rothermel]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Time jails: A hybrid approach to scalable network emulation]]></source>
<year>2008</year>
<conf-name><![CDATA[ 22ndworkshop on principles of advanced and distributed simulation. PADS&#8217;08]]></conf-name>
<conf-loc> </conf-loc>
<page-range>7-14</page-range><publisher-loc><![CDATA[Rome, Italy ]]></publisher-loc>
<publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Izal]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Urvoy-Keller]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Biersack]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Felber]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Al Hamra]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Garces-Erice]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Dissecting BitTorrent: Five months in a torrent&#8217;s lifetime]]></article-title>
<source><![CDATA[Passive and active network measurement]]></source>
<year>2004</year>
<page-range>1-11</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Katsaros]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Kemerlis]]></surname>
<given-names><![CDATA[V. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Stais]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Xylomenos]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[A BitTorrent module for the OMNeT++ simulator]]></source>
<year>2009</year>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Fan]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Lui]]></surname>
<given-names><![CDATA[J. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Chiu]]></surname>
<given-names><![CDATA[D. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Stochastic analysis of file-swarming systems]]></article-title>
<source><![CDATA[Performance Evaluation]]></source>
<year>2007</year>
<volume>64</volume>
<numero>9-12</numero>
<issue>9-12</issue>
<page-range>856-75</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[A primer for real-time simulation of large-scale networks]]></source>
<year>2008</year>
<conf-name><![CDATA[ 41stannual simulation symposium 2008. ANSS]]></conf-name>
<conf-date>2008</conf-date>
<conf-loc> </conf-loc>
<page-range>85-94</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[He]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[A large-scale real-time network simulation study using prime]]></source>
<year>2009</year>
<conf-name><![CDATA[ winter simulation conference]]></conf-name>
<conf-date>2009</conf-date>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="">
<collab>Microsoft Corporation</collab>
<source><![CDATA[BitTorrent simulator]]></source>
<year>2007</year>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Naicken]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Basu]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Livingston]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodhetbhai]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[A survey of peer-to-peer network simulators]]></source>
<year>2006</year>
<conf-name><![CDATA[ seventhannual postgraduate symposium]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pouwelse]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Garbacki]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Epema]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Sips]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[The BitTorrent P2P file-sharing system: Measurements and analysis]]></source>
<year>2005</year>
<conf-name><![CDATA[ 4thinternational conference on peer-to-peer systems]]></conf-name>
<conf-loc> </conf-loc>
<page-range>127-43</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Qiu]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Srikant]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Modeling and performance analysis of BitTorrent-like peer-to-peer networks]]></article-title>
<source><![CDATA[ACM SIGCOMM Computer Communication Review]]></source>
<year>2004</year>
<volume>34</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>367-78</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodriguez-Dagnino]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Bustos-Gardea]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Beta-binomial video traffic modeling for the knockout ATM multicasting switch]]></article-title>
<source><![CDATA[Proceedings of SPIE]]></source>
<year>1998</year>
<volume>3530</volume>
<page-range>357-68</page-range><publisher-name><![CDATA[The International Society for Optical Engineering]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="">
<collab>VMWare</collab>
<source><![CDATA[Workstation]]></source>
<year>2009</year>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Cui]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Optimizing performance of packet capture in virtual containers of OpenVZ]]></source>
<year>2010</year>
<conf-name><![CDATA[ spring simulation multiconference]]></conf-name>
<conf-date>2010</conf-date>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[San Diego, CA, USA ]]></publisher-loc>
<publisher-name><![CDATA[Society for Computer Simulation International]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
