Copyright © 2005 Department of Computer Science CPSC 641 Winter 20111 WAN Traffic Measurements There have been several studies of wide area network traffic.

Slides:



Advertisements
Similar presentations
Bro: A System for Detecting Network Intruders in Real-Time Vern Paxson Lawrence Berkeley National Laboratory,Berkeley, CA A stand-alone system for detecting.
Advertisements

Copyright © 2005 Department of Computer Science CPSC 641 Winter Self-Similarity in WAN Traffic A subsequent paper established the presence of network.
Copyright © 2005 Department of Computer Science CPSC 641 Winter Self-Similar Network Traffic The original paper on network traffic self-similarity.
A First Look at Modern Enterprise Traffic
1 Transport Protocols & TCP CSE 3213 Fall April 2015.
Copyright © 2005 Department of Computer Science CPSC 641 Winter PERFORMANCE EVALUATION Often in Computer Science you need to: – demonstrate that.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Emery Berger University of Massachusetts Amherst Operating Systems CMPSCI 377 Lecture.
Fast Pattern-Based Throughput Prediction for TCP Bulk Transfers Tsung-i (Mark) Huang Jaspal Subhlok University of Houston GAN ’ 05 / May 10, 2005.
Simulation Evaluation of Hybrid SRPT Policies
1 Network Traffic Measurement and Modeling Carey Williamson Department of Computer Science University of Calgary.
1 Network Measurements of a Wireless Classroom Network Carey Williamson Nuha Kamaluddeen Department of Computer Science University of Calgary.
1 LAN Traffic Measurements Carey Williamson Department of Computer Science University of Calgary.
1 Self-Similar Wide Area Network Traffic Carey Williamson University of Calgary.
An Empirical Study of Real Audio Traffic A. Mena and J. Heidemann USC/Information Sciences Institute In Proceedings of IEEE Infocom Tel-Aviv, Israel March.
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
Internet Traffic Patterns Learning outcomes –Be aware of how information is transmitted on the Internet –Understand the concept of Internet traffic –Identify.
An Analysis of Internet Content Delivery Systems Stefan Saroiu, Krishna P. Gommadi, Richard J. Dunn, Steven D. Gribble, and Henry M. Levy Proceedings of.
1 Is the Round-trip Time Correlated with the Number of Packets in Flight? Saad Biaz, Auburn University Nitin H. Vaidya, University of Illinois at Urbana-Champaign.
Wide Area Networks School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
Introduction to Networking & Telecommunications School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 1, Tuesday 1/9/2007)
On the Constancy of Internet Path Properties Yin Zhang, Nick Duffield AT&T Labs Vern Paxson, Scott Shenker ACIRI Internet Measurement Workshop 2001 Presented.
Network Traffic Measurement and Modeling CSCI 780, Fall 2005.
Network Monitoring: A Practical Approach Philip Smith/IT Services University of Windsor March 21, 2003.
Networking Basics: A Review Carey Williamson iCORE Chair and Professor Department of Computer Science University of Calgary.
Report by: Loizos Konomou EL933 Fall 2005 Prof: Yong Liu Ruoming Pang, Mark Allman, Mike Bennett, Jason Lee, Vern Paxson, Brian Tierney Princeton University,
Copyright © 2005 Department of Computer Science CPSC 641 Winter Network Traffic Measurement A focus of networking research for 20+ years Collect.
Copyright © 2005 Department of Computer Science CPSC 641 Winter LAN Traffic Measurements Some of the first network traffic measurement papers were.
1 TCP Traffic Analysis in cooperation with Motorola Todd DeSantis and David Loose Advisor: Professor Mark Claypool Co-Advisor: Professor Robert Kinicki.
HTTP and TCP: A Review Carey Williamson iCORE Chair and Professor Department of Computer Science University of Calgary.
Passive traffic measurement Capturing actual Internet packets in order to measure: –Packet sizes –Traffic volumes –Application utilisation –Resource utilisation.
Copyright © 2005 Department of Computer Science CPSC 641 Winter Tutorial: TCP 101 The Transmission Control Protocol (TCP) is the protocol that sends.
1 WAN Measurements Carey Williamson Department of Computer Science University of Calgary.
Introduction to Networking & Telecommunications School of Business Eastern Illinois University © Abdou Illia, Spring 2015 (January 14, 2015)
Sechang Son Computer Sciences Department University of Wisconsin-Madison Network Bandwidth Regulation.
Networking LAN (Local Area Network) A network is a collection of computers that communicate with each other through a shared network medium. LANs are.
Signatures As Threats to Privacy Brian Neil Levine Assistant Professor Dept. of Computer Science UMass Amherst.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Differences between In- and Outbound Internet Backbone Traffic Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering Chalmers University.
A First Look at Traffic on Smartphones Hossein Falaki Dimitrios Lymberopoulos Ratul Mahajan Srikanth Kandula Deborah Estrin.
Networking LAN (Local Area Network)  A network is a collection of computers that communicate with each other through a shared network medium.  LANs.
Release 16/07/2009Jetking Infotrain Ltd. Assembling and Cabling Cisco Devices Chapter 3.
MonNet – a project for network and traffic monitoring Detection of malicious Traffic on Backbone Links via Packet Header Analysis Wolfgang John and Tomas.
Measuring the Congestion Responsiveness of Internet Traffic Ravi Prasad & Constantine Dovrolis Networking and Telecommunications Group College of Computing.
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
Detection of Routing Loops and Analysis of Its Causes Sue Moon Dept. of Computer Science KAIST Joint work with Urs Hengartner, Ashwin Sridharan, Richard.
Network Emulation for the Study and Validation of Traffic Models, Congestion and Flow Control in TCP/IP Networks Cheryl Pope Lecturer Department of Computer.
Top-Down Network Design Chapter Twelve Testing Your Network Design Oppenheimer.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
WAN Transmission Media
Performance Limitations of ADSL Users: A Case Study Matti Siekkinen, University of Oslo Denis Collange, France Télécom R&D Guillaume Urvoy-Keller, Ernst.
#16 Application Measurement Presentation by Bobin John.
1 Internet Traffic Measurement and Modeling Carey Williamson Department of Computer Science University of Calgary.
Understanding Online Social Network Usage from a Network Perspective F. Schneider et al (T-Labs, AT&T) Internet Measurement Conference 2009 Networking.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
Chapter 5 Network and Transport Layers
Chapter 5 Network and Transport Layers
The Devil and Packet Trace Anonymization
Fast Pattern-Based Throughput Prediction for TCP Bulk Transfers
Top-Down Network Design Chapter Twelve Testing Your Network Design
Introduction to Networking & Telecommunications
© 2003, Cisco Systems, Inc. All rights reserved.
CPSC 641: Network Measurement
CPSC 641: LAN Measurement Carey Williamson
TCP Sequence Number Plots
CPSC 641: WAN Measurement Carey Williamson
2019/1/1 High Performance Intrusion Detection Using HTTP-Based Payload Aggregation 2017 IEEE 42nd Conference on Local Computer Networks (LCN) Author: Felix.
Carey Williamson Department of Computer Science University of Calgary
Carey Williamson Department of Computer Science University of Calgary
CPSC 641: Network Measurement
Internet Research Group at Clemson University
Presentation transcript:

Copyright © 2005 Department of Computer Science CPSC 641 Winter WAN Traffic Measurements There have been several studies of wide area network traffic (i.e., Internet traffic) We will look briefly at two of these: –Caceres, Danzig, Jamin, and Mitzel – 1991 –Paxson 1993

Copyright © 2005 Department of Computer Science CPSC 641 Winter Measurement Methodology The wide area network measurements collected by Caceres et al. focus solely on TCP/IP traffic Uses tcpdump Collected data from several different sites (e.g., UC Berkeley site: 5.9 million pkts/day)

Copyright © 2005 Department of Computer Science CPSC 641 Winter Data Collection Used Sun 3 workstation Added special timer with 10 usec resolution Collect 56 bytes of data from each packet, including data link, network, and transport layer information Use well-known port ids to classify applications Packet loss: 0% (estimated)

Copyright © 2005 Department of Computer Science CPSC 641 Winter Data Analysis Characterizes different network applications based on a number of criteria Number of bytes transferred Duration of connections Number of packets sent Packet sizes Packet interarrival times

Copyright © 2005 Department of Computer Science CPSC 641 Winter Main Observations Both interactive and bulk transfer traffic have a large number of short conversations 75-90% of bulk transfer connections send less than 10 KB 90% of interactive conversations send less than 1000 packets, and 50% last less than 90 seconds in duration Most conversations are bidirectional (even bulk transfers) Bulk transfer accounts for over 50% of the packets and bytes transferred Interactive traffic: small packets Bulk transfer: big packets Bimodal packet size distribution results

Copyright © 2005 Department of Computer Science CPSC 641 Winter Summary One of the first detailed studies of wide area network TCP/IP traffic Identified characteristics of the traffic for different network applications Proposed models for packet size distribution, packet interarrival times, etc Modeling package tcplib is available (free)

Copyright © 2005 Department of Computer Science CPSC 641 Winter More WAN Measurements ‘‘Measurements and Models of Wide Area TCP Conversations”, Vern Paxson, 1993 More wide area network measurements All TCP conversations between Lawrence Berkeley Laboratory (LBL) and the rest of the Internet world

Copyright © 2005 Department of Computer Science CPSC 641 Winter Measurement Methodology Uses tcpdump Captures only SYN (start) and FIN (end) packets of TCP connections (conversations) Provides all the information needed for conversation level characterization Dramatically reduces storage space needed Makes longer trace durations possible

Copyright © 2005 Department of Computer Science CPSC 641 Winter Measurement Tools Sun 3/50 on a network between LBL and the Internet Capture all packet headers with SYN or FIN Saved to local disk for later analysis Headers have port id info for identifying specific network applications

Copyright © 2005 Department of Computer Science CPSC 641 Winter Measurements Results are reported for one month of data (Nov 1990) 123,703,757 packets seen Average of 3.5 million per day (40 per sec) 84 MB of raw trace data 210,868 conversations Represents 5.6 GB of user data 11 different application protocols identified in the traces Results reported separately for each, and in aggregate Repeated measurements in March 1991 to assess growth in traffic with time (longitudinal study)

Copyright © 2005 Department of Computer Science CPSC 641 Winter Data Analysis Presents aggregate workload characteristics, as well as a per application breakdown Volume of data transferred Network bandwidth used Conversation lifetime Conversation interarrival times Geographical distribution Develops models for each application as well

Copyright © 2005 Department of Computer Science CPSC 641 Winter Summary A very nice detailed study of wide area network TCP/IP traffic Novel aspects: trace collection methodology, geographic analysis, models, growth Identified significant growth in Internet traffic over fairly short time span Growth continues to this day (and beyond!)