A First Look at Modern Enterprise Traffic

Slides:



Advertisements
Similar presentations
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
Advertisements

Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
CCNA 1 v3.1 Module 11 Review.
Copyright © 2005 Department of Computer Science CPSC 641 Winter WAN Traffic Measurements There have been several studies of wide area network traffic.
The Transport Layer Chapter 6. The Transport Service Services Provided to the Upper Layers Transport Service Primitives Berkeley Sockets An Example of.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Network Analyzer Example
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
Report by: Loizos Konomou EL933 Fall 2005 Prof: Yong Liu Ruoming Pang, Mark Allman, Mike Bennett, Jason Lee, Vern Paxson, Brian Tierney Princeton University,
Instructor & Todd Lammle
Defining Network Protocols Application Protocols –Application Layer –Presentation Layer –Session Layer Transport Protocols –Transport Layer Network Protocols.
1 WAN Measurements Carey Williamson Department of Computer Science University of Calgary.
CS 356 Systems Security Spring Dr. Indrajit Ray
1 TCP/IP architecture A set of protocols allowing communication across diverse networks Out of ARPANET Emphasize on robustness regarding to failure Emphasize.
Lecture 8 Modeling & Simulation of Communication Networks.
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Workshop 1: Introduction to TCP/IP
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Guide to MCSE , Second Edition, Enhanced1 Windows XP Network Overview Most versatile Windows operating system Supports local area network (LAN) connections.
Module 3: Configuring Basic TCP/IPv4 Settings. Overview of the TCP/IP Protocol Suite Overview of TCP/IP Addressing Name Resolution Dynamic IP Addressing.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
Examining TCP/IP.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
The Transport Layer.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 11 User Datagram Protocol (UDP)
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Polytechnic University1 The internetworking solution of the Internet Prof. Malathi Veeraraghavan Elec. & Comp. Engg. Dept/CATT Polytechnic University
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
1 TCP/IP, Addressing and Services S. Hussain Ali M.S. (Computer Engineering) Department of Computer Engineering King Fahd University of Petroleum and Minerals.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Instructor & Todd Lammle
Presented by Rebecca Meinhold But How Does the Internet Work?
TCP/IP (Transmission Control Protocol / Internet Protocol)
An Internet-Wide View of Internet-Wide Scanning.  Scanning  IPv4  Horizontal scanning – individual ports  Network telescope - darknet What is internet.
1 Chapter Overview Network Communications The OSI Reference Model.
1 Chapter Overview Network Communications The OSI Reference Model.
Cisco Discovery Semester 1 Chapter 6 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
Transmission Control Protocol (TCP) Internet Protocol (IP)
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Networking Training (CCENT/CCT/CCNA R&S) Rick Rowe Ron Giannetti.
NT1210 Introduction to Networking
End-host IP: MAC: 11:11:11:11:11 gateway IP: MAC: 22:22:22:22:22 Google server IP: interne t interface DNS server IP:
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
Application Layer Functionality and Protocols Abdul Hadi Alaidi
The Devil and Packet Trace Anonymization
Implementing TCP/IP.
Lec 2: Protocols.
Due: a start of class Oct 26
How data travels through a network The Internet
Lecture 6: TCP/IP Networking By: Adal Alashban
NT1210 Introduction to Networking
Topic 5: Communication and the Internet
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
CPSC 641: WAN Measurement Carey Williamson
Lecture 2: Overview of TCP/IP protocol
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
Carey Williamson Department of Computer Science University of Calgary
Computer Networks Protocols
Presentation transcript:

A First Look at Modern Enterprise Traffic Ruoming Pang, Princeton University Mark Allman (ICSI), Mike Bennett (LBNL), Jason Lee (LBNL), Vern Paxson (ICSI/LBNL), and Brian Tierney (LBNL)

The Question “What does the traffic look like in today’s enterprise networks?” Previous work LAN traffic [Gusella 1990, Fowler et.al. 1991] More recent work on individual aspects: Role classification [Tan et.al. 2003], Community of interest [Aiello et.al. 2005] Wide area Internet traffic measurements First study: [Cáceres 1989] … when the size of Internet was ~130,000 hosts … about the size of a large enterprise network today

Our First Look Which applications account for most traffic? Who is talking to whom? What’s going on inside application traffic? Esp. ones that are heavily used but not well studied: Netware Core Protocol (NCP), Windows CIFS and RPC, etc. How often is the network overloaded? For all above, compare internal vs. wide area

Trace Collection Where: Lawrence Berkeley National Lab (LBNL) A research institute with a medium-sized enterprise network Caveat: one-enterprise study “The traffic might look like …” How: tapping links from subnets to the main routers Caveat: only traffic between subnets

LBNL Trace Data Five data sets Over three months: Oct 2004 -- Jan 2005 Date Oct 4, 04 Dec 15, 04 Dec 16, 04 Jan 6, 05 Jan 7, 05 Duration 10min 1 hour Subnets 22 18 Traced Hosts 2,531 2,102 2,088 1,561 1,558 Packets 18M 65M 28M 22M Snaplen 1500 68 LBNL as an enterprise, research insitute … between subnets, meaning of ‘wide-area’. Five data sets Over three months: Oct 2004 -- Jan 2005

LBNL Trace Data Each trace covers a subnet Date Oct 4, 04 Dec 15, 04 Dec 16, 04 Jan 6, 05 Jan 7, 05 Duration 10min 1 hour Subnets 22 18 Traced Hosts 2,531 2,102 2,088 1,561 1,558 Packets 18M 65M 28M 22M Snaplen 1500 68 Each trace covers a subnet Lasts ten minutes or one hour

LBNL Trace Data Two sets of subnets 2,000 hosts traced per data set D0 Date Oct 4, 04 Dec 15, 04 Dec 16, 04 Jan 6, 05 Jan 7, 05 Duration 10min 1 hour Subnets 22 18 Traced Hosts 2,531 2,102 2,088 1,561 1,558 Packets 18M 65M 28M 22M Snaplen 1500 68 Two sets of subnets 2,000 hosts traced per data set

LBNL Trace Data Subnets are traced two at a time Date Oct 4, 04 Dec 15, 04 Dec 16, 04 Jan 6, 05 Jan 7, 05 Duration 10min 1 hour Subnets 22 18 Traced Hosts 2,531 2,102 2,088 1,561 1,558 Packets 18M 65M 28M 22M Snaplen 1500 68 Subnets are traced two at a time With four NIC’s on the tracing machine

LBNL Trace Data D0 D1 D2 D3 D4 Date Oct 4, 04 Dec 15, 04 Dec 16, 04 Jan 6, 05 Jan 7, 05 Duration 10min 1 hour Subnets 22 18 Traced Hosts 2,531 2,102 2,088 1,561 1,558 Packets 18M 65M 28M 22M Snaplen 1500 68 Packets with full payloads allow application-level analysis

Outline of This Talk Traffic breakdown Origins and locality Which applications are dominant? Origins and locality Individual application characteristics

Network Layer: Is IP dominant? Yes, most packets (96-99%) are over IP Caveat: inter-subnet traffic only Aside from IP: ARP, IPX (broadcast), etc.

Transport Layer Protocols seen: TCP, UDP, ICMP Multicast: IGMP, PIM Encapsulation: IP-SEC/ESP, GRE IP protocol 224 (?) Is UDP used more frequently inside enterprise than over wide area Internet?

TCP vs. UDP / WAN vs. Enterprise Breakdown by Payload Bytes 80% traffic is internal TCP vs. UDP / WAN vs. Enterprise Breakdown by Payload Bytes

Breakdown of the first data set (D0) 80% traffic is internal Breakdown of the first data set (D0) (Bars add up to 100%)

80% (or more) payloads are sent within the enterprise. 80% traffic is internal 80% (or more) payloads are sent within the enterprise.

Yes, UDP is used more frequently inside the enterprise.

Breakdown by Flows

Application Breakdown by Bytes Bars for datasets, for a given position 100%. Application Breakdown by Bytes

NFS, Netware Core Protocol Application Breakdown by Bytes net-file: NFS, Netware Core Protocol Bars for datasets, for a given position 100%. Application Breakdown by Bytes

Application Breakdown by Bytes bulk: FTP, HPSS Bars for datasets, for a given position 100%. Application Breakdown by Bytes

Application Breakdown by Bytes windows: Port 135, 139, and 445 Bars for datasets, for a given position 100%. Application Breakdown by Bytes

Bars for each data set add up to 100% Bars for datasets, for a given position 100%. Bars for each data set add up to 100%

Internal Heavy-Weights net-file: NFS NCP backup: Dantz Veritas NCP (hundreds message types) Internal Heavy-Weights

WAN Heavy-Weights WAN ≈ web + email

name: DNS WINS misc: Calendar CardKey Breakdown by Flows

Summary of Traffic Breakdown Internal traffic (vs. wide area) Higher volume (80% of overall traffic) A richer set of applications Traffic heavy-weights Internal: network file systems and backup WAN: web and email

Outline Traffic breakdown Origins and locality Fan-in/out distribution Individual application characteristics

Half of hosts have no wide-area fan-out (in one hour).

Internal fan-out has a fat tail. SrvLoc Internal fan-out has a fat tail.

Most hosts have fan-in of no more than 10.

Outline Traffic breakdown Origins and locality Fan-in/out distribution Individual application characteristics

Example Questions Is there a big difference between internal and wide area HTTP traffic? How different are DNS and WINS (netbios/ns)? What does Windows traffic do?

Internal HTTP traffic Automated clients vs. the rest: Requests Bytes D0 D3 D4 Internal Scanners 20% 49% 19% 0.1% 0.9% 1% Google Devices 37% 8% 5% 96% 69% 48% Netware iFolder 0.2% 10% 0.0% 9% All other clients 42% 43% 66% 4% 30% 41% What is a google bot (internal google search box) Automated clients dominate the traffic.

DNS vs. WINS Where do queries come from? DNS: both local and remote; most queries come from two mail servers WINS: local clients only; queries are more evenly distributed among clients Failure rate (excluding repeated queries) DNS: 11-21% WINS: 36-50% (!) Dig into DNS query failures

Windows Traffic Port numbers don’t tell much… Port 139 NETBIOS File Sharing Port 445 CIFS/SMB LAN Browsing DCE/RPC Endpoint Mapper Port 135 File system is not file system Bro analysis (binpac?) DCE/RPC Services (logon, msgr, etc.) Dynamic Ports Port numbers don’t tell much…

Windows Traffic Application level analysis: Bro + binpac Port 139 NETBIOS File Sharing Port 445 CIFS/SMB LAN Browsing DCE/RPC Endpoint Mapper Port 135 File system is not file system Bro analysis (binpac?) DCE/RPC Services (logon, msgr, etc.) Dynamic Ports Application level analysis: Bro + binpac

Windows Traffic Breakdown Majority of CIFS/SMB traffic is for DCE/RPC services Rather than file sharing Majority of RPC traffic By request: user authentication (netlogon), security policy (lsarpc) and printing (spoolss) By size: printing (spoolss)

Not Covered in This Talk … Characteristics of more applications Email Network file systems: NFS and NCP Backup Further details about HTTP, DNS/WINS, and Windows traffic Network congestion

Conclusion A lot is happening inside enterprise Caveats More packets sent internally than cross border A number of applications seen only within the enterprise Caveats One enterprise only Inter-subnet traffic Hour-long traces Subnets not traced all at once Header traces released for download! To come: traces with payloads (HTTP, DNS, …) Caveats (one enterprise/hour/inter-subnets)

(or search for “LBNL tracing”) The End To download traces: http://www.icir.org/enterprise-tracing (or search for “LBNL tracing”)