Analyses on Architectural and Download Behavior of Xunlei

Bagdat Kamalbayev, Nazerke Seidullayeva, Adilbek Sain, Pritee Parwekar, Ikechi A. Ukaegbu

Research output: Chapter in Book/Report/Conference proceedingConference contribution


The following paper conducts an extended analysis on different measurement studies performed on popular P2P Chinese application called Xunlei. In this particular research paper, several previous researches have been studied and their arguments were compared, in order to find out finalized reason behind this enormous companies’ success. Its packet-level data was evaluated in order to understand applications network architecture and download behavior. Xunlei’s core-server layer was analyzed by division of tasks. It was discovered that application uses direct linking and applies multi-source technology in an effective way in order to increase the download speed. Also, it was found that Xunlei uses UDP as the main transport protocol for both IPTV streaming and bulk file transfer. This paper provides a broad study on Xunlei which leads to a better understanding of the Internet.

Original languageEnglish
Title of host publicationIntelligent Computing and Applications - Proceedings of ICICA 2019
EditorsSubhransu Sekhar Dash, Swagatam Das, Bijaya Ketan Panigrahi
PublisherSpringer Science and Business Media Deutschland GmbH
Number of pages11
ISBN (Print)9789811555657
Publication statusPublished - 2021
Event5th International Conference on Intelligent Computing and Applications, ICICA 2019 - Ghaziabad, India
Duration: Dec 6 2019Dec 8 2019

Publication series

NameAdvances in Intelligent Systems and Computing
ISSN (Print)2194-5357
ISSN (Electronic)2194-5365


Conference5th International Conference on Intelligent Computing and Applications, ICICA 2019


  • Bandwidth theft
  • Internet measurement
  • P2P
  • Xunlei

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Computer Science(all)


Dive into the research topics of 'Analyses on Architectural and Download Behavior of Xunlei'. Together they form a unique fingerprint.

Cite this