Tracking down Traffic Dario Bonfiglio Marco Mellia Michela Meo Nicolo’ Ritacca Dario Rossi.

Slides:



Advertisements
Similar presentations
KISS: Stochastic Packet Inspection for UDP Traffic Classification
Advertisements

Spring 2000CS 4611 Introduction Outline Statistical Multiplexing Inter-Process Communication Network Architecture Performance Metrics.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
1 Transport Protocols & TCP CSE 3213 Fall April 2015.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
Tuning Skype Redundancy Control Algorithm for User Satisfaction Te-Yuan Huang, Kuan-Ta Chen, Polly Huang Proceedings of the IEEE Infocom Conference Rio.
Skype & Network Management Taken from class reference : An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Salman A. Baset and Henning Schulzrinne.
1 An Analysis of the Skype Peer-to- Peer Internet Telephony Protocol Speaker : zcchen.
Review of a research paper on Skype
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Salman Baset and Henning Schuzrinne INFOCOMM 2006 Presenter - Bob Kinicki Presenter -
BZUPAGES.COM 1 User Datagram Protocol - UDP RFC 768, Protocol 17 Provides unreliable, connectionless on top of IP Minimal overhead, high performance –No.
The testbed environment for this research to generate real-world Skype behaviors for analyzation is as follows: A NAT-ed LAN consisting of 7 machines running.
Measurements of Congestion Responsiveness of Windows Streaming Media (WSM) Presented By:- Ashish Gupta.
Voice over the Internet (the basics) CS 7270 Networked Applications & Services Lecture-2.
PROJECT PRESENTATION “ Analyzing Factors that affect VoIP Call Quality ” Presented By: Vamsi Krishna Karnati 11/24/2014.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
1 Solutions to Performance Problems in VOIP over Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
Skype & its protocol Aaron Loar CPE 401. Introduction Skype’s Background Topology 3 Node Types Questions.
K. Salah 1 Chapter 28 VoIP or IP Telephony. K. Salah 2 VoIP Architecture and Protocols Uses one of the two multimedia protocols SIP (Session Initiation.
OIS Model TCP/IP Model.
Lect3..ppt - 09/12/04 CIS 4100 Systems Performance and Evaluation Lecture 3 by Zornitza Genova Prodanoff.
Network Layer4-1 NAT: Network Address Translation local network (e.g., home network) /24 rest of.
1 Transport Layer Computer Networks. 2 Where are we?
Revealing Skype Traffic: When Randomness Plays with You D. Bonfiglio 1, M. Mellia 1, M. Meo 1, D. Rossi 2, P. Tofanelli 3 Dipartimento di Elettronica,
11 September 2015 RE Meyers, Ms.Ed. CCENT ICND1 Exam Topics Review Describe the Operation of Data Networks: Network Diagrams and Data Paths.
Network and Systems Laboratory nslab.ee.ntu.edu.tw Te-Yuan Huang, Kuan-Ta Chen, Polly Huang Network and Systems Laboratory National Taiwan University Institute.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
1 Understanding VoIP from Backbone Measurements Marco Mellia, Dario Rossi Robert Birke, and Michele Petracca INFOCOM 07’, Anchorage, Alaska, USA Young.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
IP and Errors IP Best Effort Datagrams can be: –Lost –Delayed –Duplicated –Delivered out of order –Corrupted.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
SMUCSE 4344 transport layer. SMUCSE 4344 transport layer end-to-end protocols –transport code runs only on endpoint hosts encapsulates network communications.
Transport Layer: UDP, TCP
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Networked & Distributed Systems TCP/IP Transport Layer Protocols UDP and TCP University of Glamorgan.
Transport Layer Moving Segments. Transport Layer Protocols Provide a logical communication link between processes running on different hosts as if directly.
Thomas Silverston, Olivier Fourmaux NOSSDAV ‘07 Presenter: Chen
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
Streaming Media Control n The protocol components of the streaming n RTP/RTCP n RVSP n Real-Time Streaming Protocol (RTSP)
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
An analysis of Skype protocol Presented by: Abdul Haleem.
1. Layered Architecture of Communication Networks: TCP/IP Model
5. The Transport Layer 5.1 Role of Transport Layer It bridge the gab between applications and the network layer. Provides reliable cost-effective data.
4343 X2 – The Transport Layer Tanenbaum Ch.6.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Peer-to-Peer Networks - Skype Hongli Luo CEIT, IPFW.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
@Yuan Xue CS 283Computer Networks Spring 2011 Instructor: Yuan Xue.
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
Skype.
Chapter 9: Transport Layer
On-line Detection of Real Time Multimedia Traffic
Instructor Materials Chapter 9: Transport Layer
5. End-to-end protocols (part 1)
Chapter 3 Internet Applications and Network Programming
Rate Adaptations.
Chapter 6: Transport Layer (Part I)
RTP: A Transport Protocol for Real-Time Applications
Chapter 2 Introduction Application Requirements VS. Transport Services
Transport Layer Unit 5.
University of Houston Datacom II Lecture 1B Review Dr Fred L Zellner
Congestion Control, Internet Transport Protocols: UDP
CS4470 Computer Networking Protocols
OSI Reference Model Unit II
Transport Layer Identification of P2P Traffic
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Unit – III Network Essentials
Presentation transcript:

Tracking down Traffic Dario Bonfiglio Marco Mellia Michela Meo Nicolo’ Ritacca Dario Rossi

Agenda A few words about Skype –Known facts –Preliminary definitions Investigate Skype “Traffic” –Voice traffic Reaction to network performance degradation –Signaling traffic Signaling patterns & peer selection –Users’ behavior Please, see the paper

Why Skype ? Skype is very popular –More than 100M users, 5% of all VoIP traffic –Easy to use, many free services voice / video / chat / data transfer over IP Understanding Skype is a challenging task –Closed design, proprietary solutions –Almost everything is encrypted –Uses a P2P architecture –Lot of different flavors

Skype for Dummies Architecture –P2P design

Skype for Dummies Architecture –P2P design Service traffic –Voice calls –Video calls –Chat –Data transmission

Skype for Dummies Architecture –P2P design Service traffic –Voice calls –Video calls –Chat –Data transmission –Skypeout/Skypein

Skype for Dummies Architecture –P2P design Service traffic –Voice calls –Video calls –Chat –Data transmission –Skypeout/Skypein Signaling traffic –Login & auth. –Look for buddies –….

Methodolody Service traffic –Small scale active testbed –Controlled bandwidth, packet loss –voice service, many Codecs, TCP/UDP traffic Signaling traffic –Passive measurement technique –Adopt a black-box approach –Inspect and quantify UDP signaling –Classification framework: external peers D.Bonfiglio, M.Mellia, M.Meo, D.Rossi, P.Tofanelli, Revealing Skype Traffic: When Randomness Plays with You, SIGCOMM' hosts 1700 peers

Preliminary Definition Useful information –At installation, Skype chooses a port at random –The port is never changed (unless forced by the user) –All traffic multiplexed over the same socket (UDP preferably) Skype flow –A sequence of packets originated from a Skype peer (and destined to another skype peer) –Flow starts when the first packet is observed –Flow ends when no packet is observed for a given inactivity timeout (200s) (IP addr, UDP port) Skype peer –A Skype peer can be identified by its endpoint –Consider only peers that were ever observed making a call

Skype Source Model Skype Message TCP/UDP IP

Service traffic Codec Impact

Service Traffic: Normal Condition Bitrate [kbps] Time [s] ISAC iLBC iPCM-WB PCM G729 Aggressive Startup Smooth Transient Normal Behavior

Service Traffic: Normal Condition Message Payload [Bytes] Time [s]

Service Traffic: Normal Condition IPG [ms] Time [s]

Service traffic Transport Layer Impact

Service Traffic: TCP vs UDP B - UDP B - TCP IPG - UDP L -TCP Time [s] TCP/UDP have no impact

Service traffic Network Impact

Service Traffic: Bandwidth Limit Time [s] Skype performs congestion control

Service Traffic: Packet Loss Inter-Pkt Gap [ms] Payload [Bytes] Loss % Time [s] Loss profile Aggressively tries to deal with losses…...by multiplexing old and new voice blocks Skype performs loss recovery

Service traffic Video Traffic

Service Traffic: Video Source Time [s] Back-to-back video Massages => frame Usual IPG for pure audio messages Video messages are Bigger Voice messages are the same Skype multiplexes different sources

Signaling traffic

Signaling Traffic: Activity Pattern Legend –Consider a single client –Each dot is a packet –Top: outgoing, Bottom: incoming –For every new peer, increment the ID –For every old peer, use the previous ID Time [Hr] In Out Rather different patterns emerge from the plot

Signaling Traffic: Activity Pattern Probes –Single packet –Sent toward unknown peers –Reply possibly follows –No further traffic between the same peers pair –Majority of the flows Time [Hr] In Out Peer discovery is a continuous task

Signaling Traffic: Activity Pattern Non-Probes –Flows longer than one packet –Series of single-packet flows –Sent toward the same peer –Carry most signaling bytes Time [Hr] In Out Talk to super peers, notify buddies of status change, …

Signaling Traffic: All Peers Probes –Majority of the flows Non-probes –Carry most signaling bytes Signaling bandwidth –95% generate <100 bps –Only 1% exceeds 1 Kbps Signaling spread –95% of peers contact <40 peers (in 5 min) –1% exceeds >75 (in 5 min) Time [Hr] In Out

Conclusions Service traffic –Active testbed –Skype implements a congestion control Aggressive with losses Conservative with bottlenecks Signaling traffic –Passive measurement –Two different threads shapes the overlay Probes Non-Probes –Signaling rate and spread Very limited bitrate Large number contacted peers User Characterization –Number of calls per unit of time –Call duration for different services –Peer Lifetime Details are in the paper, not in this talk Future Work –Extensive measurement in different networks Campus LAN ADSL installation Cellular Network

Signaling Traffic: Peer Selection RTT distance –RTT between first request-reply packets –Probe RTT smaller w.r.t. non-probe traffic Round Trip Time [ms] pdf Non-Probe Probe 0% 20% 40% 60% EuropeNorth America AsiaSouth America Africa Oceania Non-Probe Probe Geolocation breakdown –Probes favor discovery of nearby hosts –Non-probes driven by social network

Signaling Traffic: Peer Selection

Signaling Traffic: Inferring Churn PDF Time [h] Peer Lifetime Peer Deathtime