CSE534 – Fundamentals of Computer Networks Lecture 16: Traffic Shaping + Net Neutrality Created by P. Gill Spring 2014, updated Spring 2015.

Slides:



Advertisements
Similar presentations
Freedom of Speech (Part 3)
Advertisements

20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Net Neutrality, What Else? Wim Nauwelaerts Partner Hunton & Williams.
High Speed Networks Budapest University of Technology and Economics High Speed Networks Laboratory Monitoring Network.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
Net Neutrality Content Providers vs. ISP vs. Consumers Blake Wright.
Net Neutrality1. Definition Net Neutrality can be broadly defined as the policy of Internet Service Provider’s (ISP’s) and Telecom Carriers treating all.
Communication Network Advisor: Group: Yun Hua Chang R Shih Chieh Yen R Wei Chieh Li R Kuang Chiu Huang.
Network Neutrality By Ema Woodward, Phil Denny, & Scott Harrison.
Net Neutrality – An Overview – Bob Bocher Technology Consultant, WI Dept of Public Instruction, State Division for Libraries ,
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
What you talk 'in bout?. Net Neutrality prevents Internet providers from blocking, speeding up or slowing down Web content based on its source, ownership.
The internet layer Skills: None IT concepts: layered protocols, the internet layer, IP protocol, router, dumb (“end-to- end,” “neutral”) networks This.
F.C.C. Seeks to Protect Free Flow of Internet Data Comments: Here's my take: if you provide service to the end-user, you only take money from the end-user.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
What you talk 'in bout?. For instance, AT&T decided to get into the Radio business in They used the station WEAF and its affiliates as an experimental.
Net Neutrality. Tussle Who’s battling? What’s at issue? Is it contained?
Ch. 28 Q and A IS 333 Spring Q1 Q: What is network latency? 1.Changes in delay and duration of the changes 2.time required to transfer data across.
Network neutrality is the idea that all internet traffic should be treated equally. It does not matter who is downloading and what is being downloaded.
Mohammed Saiyeedur Rahman.  E-commerce is buying and selling goods over the internet. This could include selling/buying mobile phones, clothes or DVD’s.
TCP/IP (Transmission Control Protocol / Internet Protocol) : The Protocol That Made the Internet Possible. By Albert Kalim (lecture materials quoted by.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
(Representation of …) URLs, IP addresses in the computer era 114 – Lecture 8.
O pen Internet Challenges in Mobile Broadband Networks Jennifer Rexford Princeton University
THE BATTLE OVER NET NEUTRALITY
FINAL PROJECT Shelby LeVasseur CSC Fall 2012 November 27 th, December 13 th, 2012.
Network Neutrality Peter Shaughnessy Justin Fromm Wei Leong Chew Charles Young Shante Collins Brought to you in part by:
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 3.
By: Matt Klena Nathan Crapis. The principle that Internet service providers (ISP’s) should enable access to all content and applications regardless of.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 07 PROF. PHILLIPA GILL – STONY BROOK UNIVERSITY.
Lecture91 Administrative Things r Return homework # 1 r Review some problems in homework # 1 r Questions about grading? Yona r WebCT for CSE245 is working!
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
CS 453 Computer Networks Lecture 18 Introduction to Layer 3 Network Layer.
Compsci 82, Fall Who Governs the Internet? l What does the IETF govern ?  and
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 08 PHILLIPA GILL – STONY BROOK UNIVERSITY.
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Internet Essentials.
Issues in New Media: Net Neutrality. What is “net neutrality?” What is Net Neutrality? (Video)(Video) Net Neutrality (Video)(Video) Save the Internet!
Network Neutrality: An Internet operating principle which ensures that all online users are entitled to access Internet content of their choice; run online.
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Why the Internet Should Stay Neutral Lydia Chen, Alex Salloum, David Talley, Angela Zhou.
Measuring Net Neutrality Alex Maltinsky Prof. Ran Giladi.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
2: Transport Layer 11 Transport Layer 1. 2: Transport Layer 12 Part 2: Transport Layer Chapter goals: r understand principles behind transport layer services:
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Net Neutrality and Quality of Service. OVERVIEW Transparency and more strict regulation IAS versus specialized services NN and monitoring of overall IAS.
Network Processing Systems Design
Fundamentals of Information Systems, Sixth Edition
Net Neutrality An ethical examination of the internet’s ownership
CS590B/690B – Measuring Network Interference (Fall 2016)
Net Neutrality: WhaT YOU NEED TO KNOW
The Internet is For Everyone
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Net 221D : Computer Networks Fundamentals
NET323 D: Network Protocols
Packet Sniffing.
WEB API.
The Internet is For Everyone
NET323 D: Network Protocols
Net Neutrality – Economics and other things
The Internet is For Everyone
Lecture 2: Overview of TCP/IP protocol
Net Neutrality The Great Debate.
Virtual Private Network zswu
Net Neutrality: a guide
Presentation transcript:

CSE534 – Fundamentals of Computer Networks Lecture 16: Traffic Shaping + Net Neutrality Created by P. Gill Spring 2014, updated Spring 2015

Outline 2  Background on Traffic Differentiation + Net Neutrality  Glasnost (optional reading)  Required Reading presentation.

Traffic differentiation The act of identifying and discriminating against certain types of Internet traffic Example: Comcast + BitTorrent

The result?

What exactly is traffic differentiation? Traffic is identified and performance is degraded How can traffic be identified? IP address Port Host name Payload Flow level characteristics Large body of work on “traffic classification” to identify different types of traffic Many products: e.g., Sandvine How might performance be degraded? Lower priority queues Spoofing dupacks (tested but not deployed)

Underlying issue: Net neutrality  They want to deliver vast amounts of information over the Internet. And again, the Internet is not something that you just dump something on. It's not a big truck. It's a series of tubes.  And if you don't understand, those tubes can be filled and if they are filled, when you put your message in, it gets in line and it's going to be delayed by anyone that puts into that tube enormous amounts of material, enormous amounts of material.

Net neutrality  The principle that ISPs and governments should treat data on the Internet equally No discrimination (performance or cost) based on User, content, site, application, etc. Debated since early 00’s Mainly in context of last-mile providers wanting to block certain sites/protocols Example: A local ISP approached a colleague for a collaboration on traffic classification… guess why? Vint Cerf (co-inventor of IP), Tim Berners-Lee (creator of Web) speak out in favor of Net Neutrality

History of Net neutrality in US 2008 FCC serves cease and desist to Comcast in relation to BitTorrent blocking June 2010 US court of appeals rules that FCC doesn’t have power to regulate ISP networks or management of its practices Dec FCC Open Internet Order: bans cable television and phone providers from preventing access to competing services (eg., Netflix) 2012 variety of complaints: vs. AT&T (for restricting Facetime), Comcast (for restricting Netflix)

History of Net neutrality in US (2) 2014 court says FCC doesn’t have authority to enforce net neutrality because ISPs are not “common carriers” Common carrier is liable for goods it carries E.g., oil pipelines ISPs treated like common carriers but not liable for third party content (e.g., slander, copyright infringement) 2015 (few weeks ago!) FCC votes in favor of treating ISPs like common carriers (with some caveats) Mobile ISPs subject to new rules! Doesn’t include things like paid peerings E.g., Google paying an ISP for a less congested connection

Outline 11  Background on Traffic Differentiation + Net Neutrality  Glasnost (optional reading)  Required Reading presentation.

How can technology help? Increasing transparency of traffic differentiation Give users tools to detect traffic differentiation when it happens Example: Reading from Web site Glasnost: Enabling End Users to Detect Traffic Differentiation. M. Dischinger, M. Marcon, S. Guha, K. Gummadi, R. Mahajan, and S. Saroiu. Goal: Allow users to detect if they are subject to traffic differentiation Focus on differentiation based on transport protocol headers (ports), or packet payload. Tests are run on demand: harder to identify shaping based on time of day Detects differentiation based on performance rather than mechanism

Design of glasnost  Emulate flows between the client and server. Vary the packet payload. Traces kept on server. Errors logged on client and then sent to server for analysis.

Detecting differentiation Comparing the maximum throughput between the control and BitTorrent flows Conservative detector Threshold computed using data from an ISP that does not differentiate

Results

Not all users of an ISP are impacted

Outline 17  Background on Traffic Differentiation + Net Neutrality  Glasnost (optional reading)  Required Reading presentation.