Carey Williamson Department of Computer Science University of Calgary

Slides:



Advertisements
Similar presentations
Bro: A System for Detecting Network Intruders in Real-Time Vern Paxson Lawrence Berkeley National Laboratory,Berkeley, CA A stand-alone system for detecting.
Advertisements

Copyright © 2005 Department of Computer Science CPSC 641 Winter Self-Similarity in WAN Traffic A subsequent paper established the presence of network.
A First Look at Modern Enterprise Traffic
1 Transport Protocols & TCP CSE 3213 Fall April 2015.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Emery Berger University of Massachusetts Amherst Operating Systems CMPSCI 377 Lecture.
September 9, Wireless Internet Performance Research Carey Williamson iCORE Professor Department of Computer Science University of Calgary.
Simulation Evaluation of Hybrid SRPT Policies
1 Network Traffic Measurement and Modeling Carey Williamson Department of Computer Science University of Calgary.
1 Network Measurements of a Wireless Classroom Network Carey Williamson Nuha Kamaluddeen Department of Computer Science University of Calgary.
1 LAN Traffic Measurements Carey Williamson Department of Computer Science University of Calgary.
1 Self-Similar Wide Area Network Traffic Carey Williamson University of Calgary.
An Empirical Study of Real Audio Traffic A. Mena and J. Heidemann USC/Information Sciences Institute In Proceedings of IEEE Infocom Tel-Aviv, Israel March.
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
Copyright © 2005 Department of Computer Science CPSC 641 Winter WAN Traffic Measurements There have been several studies of wide area network traffic.
An Analysis of Internet Content Delivery Systems Stefan Saroiu, Krishna P. Gommadi, Richard J. Dunn, Steven D. Gribble, and Henry M. Levy Proceedings of.
1 Is the Round-trip Time Correlated with the Number of Packets in Flight? Saad Biaz, Auburn University Nitin H. Vaidya, University of Illinois at Urbana-Champaign.
Introduction to Networking & Telecommunications School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 1, Tuesday 1/9/2007)
On the Constancy of Internet Path Properties Yin Zhang, Nick Duffield AT&T Labs Vern Paxson, Scott Shenker ACIRI Internet Measurement Workshop 2001 Presented.
1 Internet Protocols and Network Performance Issues Carey Williamson iCORE Professor Department of Computer Science University of Calgary.
Network Traffic Measurement and Modeling CSCI 780, Fall 2005.
Report by: Loizos Konomou EL933 Fall 2005 Prof: Yong Liu Ruoming Pang, Mark Allman, Mike Bennett, Jason Lee, Vern Paxson, Brian Tierney Princeton University,
Copyright © 2005 Department of Computer Science CPSC 641 Winter Network Traffic Measurement A focus of networking research for 20+ years Collect.
Copyright © 2005 Department of Computer Science CPSC 641 Winter LAN Traffic Measurements Some of the first network traffic measurement papers were.
1 TCP Traffic Analysis in cooperation with Motorola Todd DeSantis and David Loose Advisor: Professor Mark Claypool Co-Advisor: Professor Robert Kinicki.
HTTP and TCP: A Review Carey Williamson iCORE Chair and Professor Department of Computer Science University of Calgary.
Passive traffic measurement Capturing actual Internet packets in order to measure: –Packet sizes –Traffic volumes –Application utilisation –Resource utilisation.
Copyright © 2005 Department of Computer Science CPSC 641 Winter Tutorial: TCP 101 The Transmission Control Protocol (TCP) is the protocol that sends.
1 WAN Measurements Carey Williamson Department of Computer Science University of Calgary.
Introduction to Networking & Telecommunications School of Business Eastern Illinois University © Abdou Illia, Spring 2015 (January 14, 2015)
Networking LAN (Local Area Network) A network is a collection of computers that communicate with each other through a shared network medium. LANs are.
Signatures As Threats to Privacy Brian Neil Levine Assistant Professor Dept. of Computer Science UMass Amherst.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Differences between In- and Outbound Internet Backbone Traffic Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering Chalmers University.
A First Look at Traffic on Smartphones Hossein Falaki Dimitrios Lymberopoulos Ratul Mahajan Srikanth Kandula Deborah Estrin.
Release 16/07/2009Jetking Infotrain Ltd. Assembling and Cabling Cisco Devices Chapter 3.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.5 Internetworking Chapter 25 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
MonNet – a project for network and traffic monitoring Detection of malicious Traffic on Backbone Links via Packet Header Analysis Wolfgang John and Tomas.
Measuring the Congestion Responsiveness of Internet Traffic Ravi Prasad & Constantine Dovrolis Networking and Telecommunications Group College of Computing.
Detection of Routing Loops and Analysis of Its Causes Sue Moon Dept. of Computer Science KAIST Joint work with Urs Hengartner, Ashwin Sridharan, Richard.
Top-Down Network Design Chapter Twelve Testing Your Network Design Oppenheimer.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
CATNIP – Context Aware Transport/Network Internet Protocol Carey Williamson Qian Wu Department of Computer Science University of Calgary.
WAN Transmission Media
Performance Limitations of ADSL Users: A Case Study Matti Siekkinen, University of Oslo Denis Collange, France Télécom R&D Guillaume Urvoy-Keller, Ernst.
#16 Application Measurement Presentation by Bobin John.
1 Internet Traffic Measurement and Modeling Carey Williamson Department of Computer Science University of Calgary.
Understanding Online Social Network Usage from a Network Perspective F. Schneider et al (T-Labs, AT&T) Internet Measurement Conference 2009 Networking.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
1 Chapter 24 Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
Chapter 5 Network and Transport Layers
The Devil and Packet Trace Anonymization
Fast Pattern-Based Throughput Prediction for TCP Bulk Transfers
Characteristics of Internet Background Radiation
Top-Down Network Design Chapter Twelve Testing Your Network Design
Introduction to Networking & Telecommunications
© 2003, Cisco Systems, Inc. All rights reserved.
CPSC 641: Network Measurement
CPSC 641: LAN Measurement Carey Williamson
TCP Sequence Number Plots
CPSC 641: WAN Measurement Carey Williamson
HTTP and TCP Carey Williamson Department of Computer Science
2019/1/1 High Performance Intrusion Detection Using HTTP-Based Payload Aggregation 2017 IEEE 42nd Conference on Local Computer Networks (LCN) Author: Felix.
Networking Basics: A Review
Computer Systems Performance Evaluation
Carey Williamson Department of Computer Science University of Calgary
Carey Williamson Department of Computer Science University of Calgary
CPSC 641: Network Measurement
Internet Research Group at Clemson University
CPSC 641: Network Traffic Self-Similarity
Presentation transcript:

Carey Williamson Department of Computer Science University of Calgary CPSC 641: WAN Measurement Carey Williamson Department of Computer Science University of Calgary

WAN Traffic Measurements There have been several studies of wide area network traffic (i.e., Internet traffic) We will look briefly at two of these: Caceres, Danzig, Jamin, and Mitzel – 1991 Paxson 1993

Measurement Methodology The wide area network measurements collected by Caceres et al. focus solely on TCP/IP traffic Uses tcpdump Collected data from several different sites (e.g., UC Berkeley site: 5.9 million pkts/day)

Data Collection Used Sun 3 workstation Added special timer with 10 usec resolution Collect 56 bytes of data from each packet, including data link, network, and transport layer information Use well-known port ids to classify applications Packet loss: 0% (estimated)

Data Analysis Characterizes different network applications based on a number of criteria Number of bytes transferred Duration of connections Number of packets sent Packet sizes Packet interarrival times

Main Observations Both interactive and bulk transfer traffic have a large number of short conversations 75-90% of bulk transfer connections send less than 10 KB 90% of interactive conversations send less than 1000 packets, and 50% last less than 90 seconds in duration Most conversations are bidirectional (even bulk transfers) Bulk transfer accounts for over 50% of the packets and bytes transferred Interactive traffic: small packets Bulk transfer: big packets Bimodal packet size distribution results

Summary One of the first detailed studies of wide area network TCP/IP traffic Identified characteristics of the traffic for different network applications Proposed models for packet size distribution, packet interarrival times, etc Modeling package tcplib is available (free)

More WAN Measurements ‘‘Measurements and Models of Wide Area TCP Conversations”, Vern Paxson, 1993 More wide area network measurements All TCP conversations between Lawrence Berkeley Laboratory (LBL) and the rest of the Internet world

Measurement Methodology Uses tcpdump Captures only SYN (start) and FIN (end) packets of TCP connections (conversations) Provides all the information needed for conversation level characterization Dramatically reduces storage space needed Makes longer trace durations possible

Measurement Tools Sun 3/50 on a network between LBL and the Internet Capture all packet headers with SYN or FIN Saved to local disk for later analysis Headers have port id info for identifying specific network applications

Measurements Results are reported for one month of data (Nov 1990) 123,703,757 packets seen Average of 3.5 million per day (40 per sec) 84 MB of raw trace data 210,868 conversations Represents 5.6 GB of user data 11 different application protocols identified in the traces Results reported separately for each, and in aggregate Repeated measurements in March 1991 to assess growth in traffic with time (longitudinal study)

Data Analysis Presents aggregate workload characteristics, as well as a per application breakdown Volume of data transferred Network bandwidth used Conversation lifetime Conversation interarrival times Geographical distribution Develops models for each application as well

Summary A very nice detailed study of wide area network TCP/IP traffic Novel aspects: trace collection methodology, geographic analysis, models, growth Identified significant growth in Internet traffic over fairly short time span Growth continues to this day (and beyond!)